Benefits of distributed access enforcement
The increase of devices across the industrial workplace has led to many benefits, but this reliance on IIoT has produced an undercurrent of security concerns that need to be addressed.
This white paper looks at 3 access control models that can be implemented into industrial environments in order to improve security without compromising the benefits of IIoT:
- Centralized policy and enforcement
- Centralized policy and enforcement with edge redirection
- Centralized policy and distributed enforcement
Read on to discover the strengths and weaknesses of these 3 access architectures.