Enterprise Iot

Belden Bridges IT-OT Divide with a Next-Gen Edge Gateway Device

Belden | August 30, 2022 | Read time : 03:33 min

Belden
Belden, a leading global supplier of specialty networking solutions, introduced the Hirschmann OpEdge-8D device to further advance Industrial Internet of Things (IIoT) connectivity in large, complex industrial networks with edge computing to put operational data to better use.

The powerful new OpEdge-8D meets the fast-growing need for a seamless, secure and reliable way to connect operational systems with information systems. The advanced solution gives organizations a new way to run applications that manage and analyze large amounts of data and create actionable insights that can optimize production processes and improve efficiency.

OpEdge-8D is uniquely designed to:
  • Deploy applications (containers and virtual machines) at the network edge to leverage insights in the field that provide a value to the business, such as for operational efficiency and predictive maintenance.
  • Simplify application deployment across edge devices, no matter the quantity or location, to enable scalability and drive productivity with Belden Horizon™ console.
  • Ensure a protected link to the cloud with its secure remote access capability.


“As the number of connected devices increases, driven by the IIoT, many organizations struggle with a way to leverage massive volumes of data for smarter, more effective management of operational processes, The OpEdge-8D leverages the latest IT technologies to streamline the process of bringing local operational data to where it can be integrated quickly in a variety of applications that will produce insights that ultimately improve efficiency, maximize uptime and enable continuous process improvement.”

Jeremy Friedmar, senior product manager, Edge Solutions at Belden

Suitable for any industrial setting, the OpEdge-8D is ideal for manufacturing, energy and transportation companies looking to unite IT and OT data – from the sensor to the cloud.

About Belden
Belden Inc. delivers the infrastructure that makes the digital journey simpler, smarter and secure. We’re moving beyond connectivity, from what we make to what we make possible through a performance-driven portfolio, forward-thinking expertise and purpose-built solutions. With a legacy of quality and reliability spanning 100-plus years, we are headquartered in St. Louis and have manufacturing capabilities in North America, Europe, Asia, and Africa.

Spotlight

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Spotlight

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Related News

IoT Security

8 Vulnerabilities in OAS Platform for IoT Data, Detected by Cisco

Cisco | September 14, 2023

Cisco disclosed eight vulnerabilities in the OAS platform’s engine configuration management functionality. Three of the eight detected vulnerabilities were rated as high-severity. The issues detected in OAS platform v18.00.0072 were addressed and, v19 was released. Cisco's Talos security researchers have identified eight vulnerabilities in the Open Automation Software (OAS) Platform that can be exploited to bypass authentication, disclose sensitive information, and overwrite files. The OAS Platform is commonly used to facilitate communication and data transfer between servers, industrial control systems (ICS), IoT devices, and other hardware in industrial and enterprise settings. The OAS Platform is widely deployed in industrial operations, enterprise environments, and cross-platform integrations. It plays a crucial role in facilitating communication and data exchange across various devices and systems, facilitating logging and notifications. The vulnerabilities pose a significant security risk, especially in environments where the OAS Platform is used for critical industrial and enterprise operations. Unauthorized access and data breaches can lead to operational disruptions and potentially compromise sensitive information. Among the eight vulnerabilities, three are rated as high-severity. Cisco's Talos security researchers were responsible for discovering and disclosing these vulnerabilities. The most critical issues are CVE-2023-31242 and CVE-2023-34998, both of which are authentication bypass flaws. CVE-2023-31242 can be triggered through a sequence of requests, while CVE-2023-34998 can be exploited by sniffing network traffic. The identified vulnerabilities in the OAS Platform mainly revolve around authentication bypass, information disclosure, and file manipulation. Attackers could leverage these weaknesses to create new users, gain unauthorized access, decrypt sensitive information, and perform arbitrary file and directory actions. These vulnerabilities essentially allow attackers to gain unauthorized access to the system by loading and saving configurations to a disk and installing them on other devices. The issues were identified in OAS Platform version 18 and have been addressed in the subsequent release, version 19.00.0000, highlighting the importance of keeping software up-to-date to mitigate security risks. These issues stem from the fact that when the OAS engine is deployed, by default, no admin user is defined and no authentication is required to access functionality such as new user creation. Even if an admin user is created, the configuration must be stored prior to restarting the engine, or it will revert to its default state. An attacker can create a new user, save the changes, and thus gain access to the underlying system. Also, the vulnerability enables an attacker to acquire a protobuf containing valid admin credentials and construct their own requests. The perpetrator could then again obtain access to the underlying system by utilizing the user creation and saving functionality. Cisco warns that these authentication bypass flaws could be combined with CVE-2023-34317, an improper input validation flaw in the user creation functionality, to gain access to the underlying system by adding ‘a user with the username field containing an SSH key.’ CVE-2023-34353 is another high-severity authentication bypass that allows an attacker to perform network snooping to acquire the protobuf containing admin credentials and then decrypt sensitive information. While two of the remaining vulnerabilities could result in information disclosure, the other two could be exploited to create or overwrite arbitrary files and create arbitrary directories.

Read More

Enterprise Iot, Industrial IoT, Security

Applied Information Integrates IoT Connectivity with Alpha Technologies UPS to Provide Reliable Power to Traffic Control Industry

Businesswire | July 05, 2023

Applied Information, Inc., the leading provider of intelligent transportation infrastructure technology, announced today the ability to integrate Internet of Things (IoT) connectivity with Alpha Technologies Inc.’s battery backup systems. The new capability enhances the reliability and uptime for the traffic control infrastructure. The announcement was made today at the 2023 IMSA Forum and Expo, taking place in Reno, NV at the Peppermill Resort Spa Casino from June 25th – 29th, 2023. Traffic infrastructure operators can now easily monitor and manage critical traffic control devices, such as traffic signals and warning systems, outfitted with Alpha’s battery backup systems. Instant alerts of power outages relay important system status changes for rapid response to power outages preventing interruptions of service which could lead to crashes. Knowing the nature of the problem instantly can also save resources by avoiding unnecessary truck rolls, especially to isolated locations. “The integration of Applied Information’s remote communications technology with Alpha’s power solutions increases customer value,” said Max Guenther, Director of Industry and Traffic at Alpha Technologies, Inc. “Having the Alpha UPS backup to support intersections outages is extremely important. When combining these two solutions, customers will know the nature of the outage, if the intersection is running on battery backup, and what to do to keep systems online.” “Alpha is a leader in the UPS market. By marrying battery backup and remote communication, we can provide detailed system insights and advanced warning of power failures,” said Peter Ashley, Vice-President of Business Development for Applied Information, Inc. “As a result, Traffic Engineers will see huge time savings by knowing the exact fault before heading to site.” About Alpha Technologies Alpha Technologies Inc. provides power conversion, protection and standby products for telecommunications and cable television industries, including custom, application-specific power solutions and hardened, powered gateways for data backhaul applications. In addition to product development, Alpha Technologies provides a comprehensive range of installation and maintenance services, software solutions and consulting services to support its global customer base. Alpha Technologies is a member of The Alpha Group. For more information about Alpha power solutions, visit www.alpha.com. About Applied Information Applied Information® is the industry-leading developer of Smart Cities, Connected Vehicle (C-V2X), and Intelligent Transportation System (ITS) solutions for the surface transportation sector. Key products are smart traffic signals, school zone safety beacons, emergency vehicle preemption, transit, and school bus priority, asset security, and intelligent street lighting. Applied Information’s Glance Smart City Supervisory platform enables cities to manage all their traffic and ITS assets on one web-based application. Applied Information’s TravelSafely Connected Vehicle Messenger Engine connects smartphones, vehicles, and navigation apps to the transportation infrastructure providing a safer mobility experience for motorists and vulnerable road users. Applied Information's core values are to develop products that save lives, improve traffic, drive commerce, and help the environment. Applied Information, Inc. was founded in 2011 and is based in Alpharetta, Georgia. The Company also operates the Infrastructure Automotive Technology Laboratory (iATL), an incubator and developer of Connected Vehicle Applications. Applied Information's products are deployed in more than 1,000 jurisdictions in the U.S. and Canada.

Read More

Enterprise Iot, Platforms

D3 Security to Showcase New Smart SOAR™ Features at Infosecurity Europe

businesswire | June 26, 2023

D3 Security, the security orchestration, automation, and response (SOAR) vendor that does what others can’t, today announced that it is a sponsor of the 2023 Infosecurity Europe conference. The event takes place at ExCeL London from June 20-22. At booth AA62, D3 Security will present the new capabilities of its Smart SOAR™ platform, including enhanced reporting and its unique MSSP client access portal. "We are thrilled to showcase our Smart SOAR platform at Infosecurity Europe 2023, Europe's most anticipated cybersecurity event,” said Amardeep Dhingra, Director of Strategic Alliances at D3 Security. "We know security leaders at the event will be blown away by the latest advances in our SOAR platform, which make it easier than ever to enable an effective cybersecurity mesh architecture.” Smart SOAR’s revamped Reporting and Analytics dashboard module provides security executives and managers with personalized dashboards, enabling them to monitor their SLAs and KPIs in real time. The innovative widget-based system and highly customizable dashboards offer security teams deep insights into their security posture. Also new to Smart SOAR is the MSSP Client Portal, which revolutionizes the interaction between MSSPs and their clients, fostering transparency, collaboration, and rapid response. By giving clients limited but meaningful access to their data on the SOAR platform, Smart SOAR empowers MSSPs to serve their clients more effectively while promoting shared security objectives. D3 Security invites all attendees to visit booth AA62 at Infosecurity Europe 2023, where the D3 team will be providing demos of Smart SOAR’s capabilities. Infosecurity Europe is the largest and most attended information security event in Europe. Infosecurity Europe 2023 promises to provide critical insights and updates, specifically tailored for C-level information security professionals. This year's event has an impressive lineup of keynote speakers, exhibitors, and workshops providing CPE and CPD credits. About D3 Security D3 Security’s Smart SOAR™ helps solve many of the most entrenched problems in cybersecurity—including analyst burnout, alert overwhelm, and information silos—by transforming separate tools into a unified ecosystem with multi-tier automation, codeless orchestration, robust case management, and environment-wide reporting. Smart SOAR performs autonomous triage and drastically reduces false positives so that enterprise, MSSP, and public sector security teams can spend more time on real threats.

Read More