Visit us: all about automation in Friedrichshafen, March 5 + 6, 2024, booth B2-131

How Can Edge Computing Protect from Cyber Attacks?

With the increasing interconnectedness of systems in the context of IIoT, the selection of the suitable security is particularly important for the protection against cyber attacks. The hot topic of edge computing ensures a secure process along the value creation chain. Although the relevance is on everyone’s lips, many small and medium-sized companies are still uncertain and do not yet have sufficient knowledge at their disposal.


Schubert System Elektronik GmbH positions itself as a partner at eye level that shares expertise and advises customers along the complete system selection process with scalable hardware and software solutions for different requirements.

In an interview with the trade magazine “Computer & Automation”, Marcus Finkbeiner, Head of Sales Prime Cube®, speaks about the proper security measures and managed security services.


Are German companies sufficiently prepared for possible cyber attacks, and are their protective measures adequate?


Finkbeiner: The large companies are usually very well prepared to take appropriate protective measures in case of imminent cyber attacks. In small and medium-sized companies, however, we sense a lot of uncertainty and ignorance in this area. We position ourselves as a partner at eye level that shares expertise and advises customers along the complete system selection process with scalable hardware and software solutions for different requirements. Together with the customer, we can thus significantly reduce the risk of impairing value-creating processes.


Independent of the budget, which three security measures should companies definitely implement to protect themselves from cyber attacks?


Finkbeiner: Most attacks can be confronted very well with a good and appropriate IT and system architecture.
Und über eine Edge Computing Lösung können Unternehmen kleinere Datenkondensate in die Cloud verschieben, die nicht für sich allein nutzbar sind. Die dezentrale Verarbeitung schont nicht nur Ressourcen, sondern minimiert auch das Risiko des Datenverlustes bei Cyber-Attacken.
Furthermore, cloud computing is not just a trend but significantly contributes to strengthening the security of systems and in particular of data without cannibalising the actual value creation.
Via an edge computing solution companies can transfer smaller volumes of compressed data that cannot be used alone to the cloud. The decentral processing not only saves resources but also minimizes the risk of data loss in case of cyber attacks.


Talking about security as a service: Should the production and process industry consider managed security services?


Finkbeiner: Big companies are capable of managing their security services on their own. Due to the complexity and continuous alterations of the security risks, smaller companies usually cannot afford the respective resources alone. In this case, managed security services by a competent service provider make sense.

Follow Us

By clicking on one of the logos you will be forwarded to an external page.

More Insights

The New TLM Server in Schubert Packaging Machines

The individual components in production or automation systems are usually large systems on which different functions are brought together. The dissolution of such a monolithic system by means of virtualization and containerization makes development more efficient as well as systems more secure and scaleable. The new TLM server that has been developed for Gerhard Schubert GmbH shows the optimum interaction between hardware and software.

More