Mass Customization

Simplify IIoT Connectivity | Moxa
Group 23

Enabling a secure and reliable network to meet interconnected mass customization needs

In order to achieve an uninterrupted manufacturing process that meets the demands of mass customization, reduce downtime is critical in this type of fully automated and connected manufacturing process. The ability to efficiently upgrade, troubleshoot, and maintain multiple machines remotely is key to prevent downtime. Protecting connected machines from internal and external threats is another key consideration. Find out how to address the challenges of performing remote maintenance and guaranteeing IT-OT security collaboration for mass customization.

3.1

Establishing Multiple Secure Access Is Time-Consuming

Remotely accessing multiple machines to upgrade, troubleshoot, and maintain them can reduce unexpected downtime. However, establishing multiple secure connections for machines distributed in a large-scale application via traditional VPN and RDC (Remote Desktop Connections) methods are time-consuming and complex. What if we can simplify your remote connections in large-scale deployments?

IIoT Connectivity:

Using VPN/RDC to establish multiple secure remote connections

Problems:

  • VPNs require extensive IT knowledge. Setting them up is time-consuming and expensive for large-scope deployments
  • Installing an apparent legitimate RDC seems to be an efficient method, but it can cause security vulnerabilities

Simplified:

Cloud-based secure remote access solution

Solutions:

  • Plug-and-play remote access without technical configuration
  • End-to-end encrypted connections against man-in-the-middle attacks and on-demand connection control by local operator
  • Supports different connectivity scenarios

Case Study

Secure Remote Access for Improved Machinery Services

Location: Taiwan


Maximizing network uptime enhances machine productivity. Therefore, a Taiwan machine builder wanted to work closer with its worldwide customers to realize predictive maintenance applications remotely, so it installed remote access software on IIoT gateways to build secure connections between engineers and machines without an add-on computer. The added bonus was that the software did not require extensive IT expertise for both engineers and machine operators.

3.2

Overcoming Security Silos for Interconnected Systems

Industrial control system (ICS) networks are physically isolated and not directly connected to the Internet, so they are almost immune to cyberattacks. But, when an interconnected factory starts connecting its internal systems to external systems to provide better service to its customers, it actually puts both IT and OT operations at risk. What if we can simplify your IT-OT security collaboration?

IIoT Connectivity:

Vast differences between IT and OT

Problems:

  • Single-point consideration without a system-wide view
  • Inexperience causes problems for management

Simplified:

3-layer security architecture based on industrial standard IEC 62443

Solutions:

  • Visualized management for security audit and monitoring
  • Defense-in-depth protection for ICS with Secure Network Infrastructure
  • Hardened devices with embedded security functions

Case Study

Visualize the Security Status of Large-scale Factory Networks

Location: U.S.A


An automotive parts plant manager planned to digitalize their production processes. The field devices ran on the EtherNet/IP protocol for control unification and data acquisition. As the network infrastructure in this plant was of a large scale, it was very difficult for the plant manager to monitor all devices and visualize the network topologies. To realize digitization, all networks were interconnected from the field site all the way to the ERP and even to the cloud. It was essential to have good cybersecurity measures to allow this transformation to occur, without compromising production efficiency.

CONTACT US