This resource is no longer available

Cover Image

The increase of devices across the industrial workplace has led to many benefits, but this reliance on IIoT has produced an undercurrent of security concerns that need to be addressed.

This white paper looks at 3 access control models that can be implemented into industrial environments in order to improve security without compromising the benefits of IIoT:

  • Centralized policy and enforcement
  • Centralized policy and enforcement with edge redirection
  • Centralized policy and distributed enforcement

Read on to discover the strengths and weaknesses of these 3 access architectures.

Vendor:
Xage
Posted:
Feb 15, 2023
Published:
Feb 15, 2023
Format:
HTML
Type:
White Paper

This resource is no longer available.