Multiple Cyber Security Problems For Manufacturers 

Manufacturing was the sector most exposed to cybersecurity threats for every one of the past three years, according to a 2024 report by the World Economic Forum. The report estimated the average cost of an attack at $4.73m with costs rising by 125% each year. 

While security threats continue to rise, so does pressure on costs. Meanwhile, IT operations are becoming more complex as sprawling and fragmented networks pose a growing operational management challenge.

These issues are closely related. Complexity is a drain on costs and skills. Poorly integrated hybrid networks are also harder to secure. Manufacturers recognise that modernising the network and converging networking and security operations will produce performance, cost and security benefits, but keeping the show on the road is consuming their budgets.

This is the picture that emerges from a survey of manufacturers by Gatepoint Research published last November. Manufacturers in the survey have highly distributed networks covering multiple sites, devices, users and partners, making them an easy target for internal attackers, supply chain threats and ransomware. 42% have between 26 and 100 sites with 12% of respondents operating more than 100 sites.

The report reveals that while many in the sector are moving to adopt cloud and hybrid environments, a majority (78%) still operate in mixed data environments, reflecting the unique demands of manufacturing and the prevalence of legacy systems. This creates both opportunities and challenges for implementing solutions that can support multi-cloud and hybrid datacenter setups, secure connectivity across locations, and improved observability into network performance and security. 

Manufacturers recognise where they need to get to but are getting there slowly. 

Converging network and security operations is a top priority for 38% of respondents, but far fewer (22%) have adopted the converged solutions that would make this possible, while 28% are deferring a decision for at least 12 months and 32% have no current plans.
  
Lauridsen Group International (LGI) illustrates how the path to better security starts with network modernisation. Lauridsen comprises six companies making health and nutrition products across 60 locations and 20 countries.
In 2022 the company replaced its mixed SD-WAN and MPLS networking environment with a managed SD-WAN service.

This resulted in immediate operational improvements, reducing the need to deal with multiple vendors for last-mile connectivity services while improving network performance and reliability. 

The next step two years later was adoption of Aryaka’s Unified SASE as a Service to replace a managed Check Point virtual firewall. This enabled LGI to converge networking and security while reducing the number of vendors it needed to manage. It also gave the IT team granular control over user access from all levels of the network, creating tailored rules for anyone interacting with their network.

The LGI example illustrates that progress is fastest when the journey is broken down into manageable steps: 

  • Conduct an audit of security and access needs: Start by evaluating each facility’s security requirements and remote access demands. This will allow you to prioritise the most impactful upgrades.
  • Simplify management via SD-WAN and NGFW: SD-WAN and NGFW work hand in hand to simplify connectivity and security. This combination allows for more efficient policy management, thus enabling uniform security across locations. The move to NGFW also produces tangible operational and cost benefits as it enables consolidation of outdated security appliances. 
  •  Work with partners to secure the supply chain: By ensuring that partners adhere to the same security standards, manufacturers can mitigate the risks posed by external threats. 
  • Monitor supply chain network traffic: By extending network visibility into the supply chain, manufacturers can track and monitor data flows, identify abnormal activities, and detect potential vulnerabilities before they become major threats.
  • Adopt a zero trust architecture: Zero trust principles, which ensure that every user and device is continually authenticated and validated, can be extended to third-party connections. Manufacturers should treat every connection with a third-party vendor as a potential threat, ensuring comprehensive verification before granting access to sensitive systems.

The Gatepoint report clearly shows that manufacturers are prioritising improved security but failing to tackle the network infrastructure issues that stand in the way of progress. It concludes that they can break this deadlock by investing in visibility solutions that enable better identification of risks; adopting managed security services to reduce the burden on internal IT teams; securing applications at the network edge to overcome the challenges of hybrid environments; and converging network and security operations whether through consolidation of operations or improved collaboration between teams. 

Manufacturers have compelling reasons to modernise their networks and improve their security posture. Some are now beginning to join the dots and recognise that tackling these issues together using converged networking and security technology is not only possible but optimal. 

Renuka Nadkarni is Chief Product Officer at Aryaka

Image: Ideogram

You Might Also Read:

The Industries Facing The Biggest Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A History Of Artificial Intelligence: Its Current & Future Development
Defending The Gig Economy Against API Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.