Press

How Do We Secure the Intelligent Edge?

By April 11, 2018 No Comments

Edge computing is transforming industrial operations into highly-connected, cyber-physical systems – heavily reliant on analytics, AI, and machine-to-machine cooperation. From autonomous driving to robotics to distributed energy generation, the next generation of edge computing will be more critical to connected operations than ever before. But, to truly benefit from edge computing, we must first secure the edge.

Traditional, centralized security systems do not match the scale and complexities required by the edge. Edge security must mirror the characteristics of the edge itself: distributed, decentralized, autonomous, scalable, and continuously available – even over intermittent network connections. Edge security solutions must autonomously enforce security for all devices, applications, and user transactions, as well as preserve centralized policy and management. The layered and multi-point decentralized security architecture must ensure device authenticity, data confidentiality, and access control, as well as guarantee no single point of failure with the ability to immediately detect and self-heal if ever under attack.

Xage’s blockchain-protected security fabric maps to the requirements of the edge and is woven directly into it, creating a distributed, redundant, and tamper-proof ecosystem that grows stronger with every device added. Xage redefines device lifecycle management for the modern operator and provides a comprehensive and seamless solution for multi-vendor, zero-touch deployment and new device enrollment in the field. It also delivers role-based access control for industrial devices, setting, rotating, and hiding device-level passwords. Xage furthermore enables multi-vendor, multi-customer distributed authentication and access control in the industrial edge, protecting deployed SCADA/DCS systems by creating digital identities for participating components, requiring them to authenticate to the Xage security fabric.

White Paper

Download
the whitepaper

The current model of enterprise security is incapable of protecting Industry 4.0 with its intermittently connected, heterogeneous devices and applications, distributed across organizations and geographies. Today’s centralized IT security paradigm needs to be replaced by cybersecurity that is distributed, flexible and adaptive.