Smart Factory

2019/04/15

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro participated in the 2019 edition of Hannover Messe, which, with more than 6,000 exhibiting companies and over 200,000 visitors every year, is the world’s leading trade show for industrial technology.

2019/04/08

Security in the Era of Industry 4.0: Dealing With Threats to Smart Manufacturing Environments

Security in the Era of Industry 4.0: Dealing With Threats to Smart Manufacturing Environments

As manufacturing companies continue to adopt Industry 4.0, many environments could still be falling short on security with outdated systems, unpatched vulnerabilities, and unsecure files that leave them vulnerable to attacks.

2019/04/03

Trend Micro’s Industrial IoT Joint Venture, TxOne Networks, Offers Sneak Peek of Solution to Securing Industrial Machinery

Trend Micro’s Industrial IoT Joint Venture, TxOne Networks, Offers Sneak Peek of Solution to Securing Industrial Machinery

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, and Moxa, a leader in industrial communication and networking, preview their first jointly developed security offering.

2019/01/30

Yokogawa adopts Trend Micro™ Deep Security as a Service™ to protect industrial IoT platform

Yokogawa adopts Trend Micro™ Deep Security as a Service™ to protect industrial IoT platform

In order to protect multi-tenant IIoT Platform which handles vital information such as plant operational status and parameters, Yokogawa was exploring the comprehensive cloud security solution with a proven track record of running on the Google Cloud Platform.

2019/01/15

Attacks Against Industrial Machines via Vulnerable Radio Remote Controllers: Security Analysis and Recommendations

Attacks Against Industrial Machines via Vulnerable Radio Remote Controllers: Security Analysis and Recommendations

Radio frequency (RF) technology is being used in operations to control various industrial machines. However, the lack of implemented security in RF communication protocols could lead to production sabotage, system control, and unauthorized access.

2018/12/26

Security Architecture for Smart Factories

Security Architecture for Smart Factories

Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer.

2018/12/18

Yokogawa adopts Trend Micro™ Portable Security™ 2 to protect manufacturing facilities from viruses

Yokogawa adopts Trend Micro™ Portable Security™ 2 to protect manufacturing facilities from viruses

Yokogawa, a leader in the field of control and operation monitoring systems, recently deployed Trend Micro™ Portable Security™ 2 to protect their control systems from viruses that could ...

2018/12/13

Securing Smart Manufacturing with Connected Threat Defense

Securing Smart Manufacturing with Connected Threat Defense

By David Tay, the CIO of Beyonics You’d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming from use of emerging...

2018/12/11

Security Threats and Risks in Smart Factories

Security Threats and Risks in Smart Factories

A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.

2018/12/10

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

We looked into MQTT brokers and CoAP servers around the world to assess IoT protocol security. Learn how to prevent risks and secure machine-to-machine (M2M) communications over MQTT and CoAP in our research.

2018/12/06

Water and Energy Sectors Through the Lens of the Cybercriminal Underground

Water and Energy Sectors Through the Lens of the Cybercriminal Underground

In our research Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries, we found exposed HMIs and how these systems were at risk.

2018/12/04

Trend Micro™ Safe Lock™ delivers Nissin Electric antivirus security for their customers’ peace of mind

Trend Micro™ Safe Lock™ delivers Nissin Electric antivirus security for their customers’ peace of mind

Nissin Electric Co. Ltd., a major electrical equipment manufacturer in Japan, recently deployed Trend Micro™ Safe Lock™ to protect their manufacturing plants’ control systems.

2018/11/29

Uncovering the Truth About Corporate IoT Security

Uncovering the Truth About Corporate IoT Security

This research looks at the kinds of IoT projects being driven by global organizations, their key challenges and perceived threats, along with hard data outlining the frequency and type of attacks they’ve already experienced.

2018/11/28

IIoT World Virtual Conference Targets Transportation and Logistics Industries

IIoT World Virtual Conference Targets Transportation and Logistics Industries

Many companies of all sizes have now gone beyond connecting their laptops and other information technology (IT) to the internet and also linked their operational technology (OT), including devices and machinery for manufacturing, retail sales, distribution, utilities, and energy generation.

2018/11/26

Suzuki adopts Trend Micro™ Portable Security™ 2 to build a secure industrial control system

Suzuki adopts Trend Micro™  Portable Security™ 2 to build a secure industrial control system

As Suzuki’s global production and sales continue to grow, so do their concerns about the security of terminals at development and manufacturing sites, particularly in closed environments.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop