Featured Image

Why Is Protecting an OT Network More Challenging Than Protecting an IT Network?

Sep 23, 2021

Today, a business’s shop floor network, its operational technology (OT) network, faces essentially the same security threats as their general business network, or information technology (IT) network. Fortunately, the same technologies are available to protect both network environments. So, why is it harder to deploy cybersecurity implementations in the OT environment, and why does it generally take significantly longer to complete these implementations?

There are three basic differences in the OT network environment that make defining and deploying a security solution different from the IT environment: equipment, manufacturing practices, and network responsiveness.

The individuals tasked with extending a business’s network onto the manufacturing shop floor almost exclusively come from the IT world. They have had little or no exposure to the unique requirements of the OT environment. This disconnect often leads to significant tension between those network professionals and the manufacturing teams tasked with keeping production running smoothly. 

Many of the methods and procedures utilized to deploy security technologies for an IT network cannot be reasonably deployed in the OT environment. For example: In the IT environment, an older PC that cannot support the latest security technologies is commonly updated with a newer unit. In manufacturing, replacing or upgrading a piece of production equipment typically is not practical due to cost (potentially tens or hundreds of thousands of dollars) and the impact on production (a replacement is typically measured in days, weeks, and/or months). Other differences in practice include how people are assigned to pieces of equipment, how software upgrades and updates can be deployed without interruption to production, and how these security processes impact the interaction between pieces of equipment where high-speed coordination is required.

With the growing demand for deployment of digital manufacturing technologies, it is critical that companies include appropriate network security measures as part of these deployments. It takes a coordinated effort between a company’s IT and manufacturing teams to develop a plan for implementing an effective network security strategy. There is no “cookie-cutter” standard solution to fit every factory environment due to the unique combination of equipment and operating requirements of each facility. Developing this network strategy takes time, good communications between the teams, and compromise (trade-offs between the traditional IT security solutions and the reality of the manufacturing shop floor).

The more successful OT network implementations start with planning – a lot of planning. A growing trend is the development of OT professionals – IT professionals who are tightly integrated into the manufacturing team and develop a deep understanding of manufacturing operations. AMT is doing its part by identifying the issues and challenges associated with deploying network security solutions in the OT environment. This effort includes fostering discussions between manufacturing companies and the suppliers of shop floor equipment in order to address how manufacturing equipment and systems can more readily support the network security strategies required by the digital manufacturing architectures of the future.

Stay tuned for additional articles digging deeper into some of the unique challenges in deploying network security measures for the manufacturing shop floor.

PicturePicture
Author
John Turner
Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute.
Recent technology News
Gaming PCs offer top-tier hardware, customization, and maximized performance for far less money than a comparable prebuilt workstation. Dubbed the "Digital Twingine," AMT's new rig will tackle digital twin modeling, CAD/CAM, and the Nvidia Omniverse.
Confused by CMMC 2.0? This guide makes sense of the rules, shows how it impacts your shop floor, and helps you turn cybersecurity compliance into a competitive edge in the DoD supply chain.
Change is happening faster than ever. With it comes opportunities – as well as potentially insurmountable challenges to the status quo.
OpenUSD and USD refer to the same core technology, with OpenUSD emphasizing the framework's open-source nature.
Apple, like Thomas Edison, has essentially created a business model in which they take the ideas of others (like almost every iteration of the light bulb), take credit, and get away with it.
Similar News
undefined
Smartforce
By Catherine “Cat” Ross | Sep 03, 2025

Morris Group is Okuma's distributor of the year. Autodesk opens the Technology Engagement Center. DN Solutions builds a plant in India. Mazak expands with Phoenix Technical Center. Mitsubishi HC Capital America and Trumpf get new hires and regional reps.

5 min
undefined
Smartforce
By Catherine “Cat” Ross | Aug 20, 2025

IACMI turns 10. Zoller celebrates 80 years. Mission named Co-op Employer of the Year. Plus a brand relaunch from Lambda Function, Stratasys' major facility news, leadership appointments at Kyzen, Mitsubishi HC Capital America, and Tolomatic, and more.

5 min
undefined
Intelligence
By Christopher Chidzik | Aug 01, 2025

With a robust history of data spanning nearly three decades, AMT’s statistical programs offer the most frequent, accurate, and applicable information on the manufacturing technology market.

4 min