What is Your Layered Security Approach? A Look at Defense in Depth
Barry Turner, Technical Business Development Manager at Red Lion Controls, joined host Tyler Kern for a live discussion on secure remote access and the importance of companies developing solutions that ensure a higher frequency of cyberattacks doesn’t end in disaster.
“Red Lion has been doing remote access for quite some time,” Turner said. “We just came out with our new remote access platform. It’s an all-encompassing platform that allows our customers to build machines and industrial products and send those products out into the field. And, if they need to get access to those assets wherever they may land, to do troubleshooting, to do upgrades or be able to work with those pieces of equipment as if they were local, our platform makes that simple, easy and secure.”
Red Lion uses a defense-in-depth, layered approach to security. It’s a combination of things put together to make it more and more difficult for would-be hackers to get into an asset.
Today, it makes perfect sense to have access to remote assets and devices for various needs, from service and maintenance to software updates. But that access must be secure. Recent cyberattacks like the Colonial Pipeline attack illustrate the importance of such security measures.
With solutions like the ones provided by Red Lion Controls, obtaining a high level of security is easy.