- The companies will make the services available in the initial part of next year
- Mocana’s TrustPoint software can be installed on IIoT device that has computational capabilities and network connectivity to harden devices
According to a report by Globe Newswire, Mocana Corporation has collaborated with Siemens Digital Industries Software to bring end-to-end security for any Industrial Internet of Things (IIoT) devices connecting to the Siemens MindSphere Cloud. Mocana is integrating TrustPoint which is its on-device security software that protects IIoT endpoints and TrustCenter, a security orchestration platform for managing the security lifecycle of these IIoT devices with MindSphere. The companies will make the services available in the initial part of next year.
Stephen Bashada, Executive Vice President and General Manager of Siemens MindSphere said, “Mocana is a recognized world-leader in their ability to protect IIoT devices from the inside out. The combination of Siemens’ deep industrial IoT domain knowledge with Mocana’s deep IIoT device security expertise is a powerful step forward for our customers.”
Connects products, plants, systems and machines
MindSphere is the cloud-based, open IoT operating system from Siemens that connects products, plants, systems and machines, allowing businesses to use data generated by the Internet of Things (IoT) with advanced analytics. Mocana’s TrustPoint software can be installed on IIoT device that has computational capabilities and network connectivity to harden devices while providing secure connectivity between those same devices and Siemens MindConnect hardware.
Dean Weber, CTO of Mocana said, “Industrial manufacturers are adopting Industrial IoT (IIoT) devices to connect sensors and industrial systems to virtualize the entire production line. This increase in connectivity provides additional insight into the performance and reliability of systems to improve asset performance, minimize downtime, and reduce maintenance costs. Unfortunately, it also introduces new cybersecurity risks and ways for hackers to attack control systems to compromise their safety and uptime and generate inaccurate data.”