SlideShare a Scribd company logo
1 of 29
CodeMeter Security with
integrated Industrial Flash Memory
Oliver Winzenried
CEO WIBU-SYSTEMS AG
oliver.winzenried@wibu.com
Demystifying
Industrial Security
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1
Connected World
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 2
Changes in IoT and Industrie 4.0, …
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 Stand-Alone Devices
 Fixed Features
 One-Time Business
 Product, Upgrades, Service, Spare
parts/consumables, replacement
 Only Repair / Maintenance
 Individual Hardware
TomorrowToday
 Connected Devices
 Upgradable Features (App Store)
 Recurring Revenues
 Pay-Per-Use, Pre-Paid, Post-Paid
 New Business Models
 Shorter Time-to-Market, Cloud
 Standard Platforms (HW & SW)
3
Challenges
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 4
Security versus Safety
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 Safety
Protection of humans or environment
against risks that come from a (known)
technical system
 IT Security
Protection of a technical system against
attacks (unknown) and disruption
caused by environment or humans
Human / Environment
Technical System
Technical System
Human / Environment
5
Challenge: Security Threats Today
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 Manipulation & Tampering
 Espionage: Industrial and NSA, Prism, Tempora, …
 Cyber-Attacks: Stuxnet, Duqu, Flame, … (German TV, January 2015)
6
Challenge: Piracy Problem – Latest Studies
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 German Engineering Federation (VDMA) 2014:
 7.9 Billion € piracy losses
 9 of 10 companies affected
 71% affected by piracy
 51% affected by counterfeiting
of complete machines
 JMF-Study: Japan losses 1.8 times higher
 BSA-Study: Losses 63 Billion US$, globally 42%
50%
66% 67% 68%
62%
67% 71%
2003 2006 2007 2008 2010 2012 2014
N=337
Is your company
affected
by product or brand
piracy?
Yes:
71%
No:
29%
7
Opportunities
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
Protection
against:
IP Theft
Hacking
Tampering
Licensing:
License Models
Business Models
License Management
License Deployment
8
Why CodeMeter with Flash Memory?
 Security and memory in ONE Device
 Retrofitting in Brownfield
 Cost, Space, Power, … benefits
 Highest Reliability & Quality
 Excellent components and
Partnerships:
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 9
Solutions
Working Principles
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
Wibu-Systems Solutions & Process
Products & Use Cases
10
Technical Solutions
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 Know-how Protection -> using data and program code encryption
 IP in software, source code, algorithms
 IP in embedded systems, PLCs, devices, IoT, data, documents, …
 Software and Product Protection -> encryption & unclonable crypto keys
 Counterfeiting reduction, prevention of unauthorized use (active and passive)
 Flexible Licensing -> using encryption and business process integration
 New business models simplify logistics and monetize software
 Tamper Protection -> using digital signature
 Prevention of manipulation – Cyber-Security – IoT, Industrie 4.0
11
Requirements in Industrial Applications
 Highest Security for IP and tamper protection:
 Users are not the attackers but organized crime, terrorism, competition
 Use of secure elements for industrial interfaces and environments
 Flexible Storage for multiple licenses
 Multiple (device) options and features
 Different stake holders and rights owners, i.e. automation or machine supplier, user
 Communication Security: Cyber Security
 Certificates for OPC UA
 Retrofitting
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 12
Wibu-Systems Technologies and Solutions
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 13
Software Integration
Back Office Integration
Protection Suite: Ax/Ex/Ix-Protector
CodeMeter License Central
 CodeMeter®
 Secure Key Storage (Hardware / Software)
 De-/Encryption (AES, ECC, RSA)
 Flexible License Models
 Software Integration
 Automatic Code Protection / API
 Secure Boot / OPC UA
 Back Office Integration
 Key and certificate deployment
 License deployment
 License administration
Integrate Once – Deliver Many
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 14
Integration into processes
Delivery to the userIntegration into software
Software Software
CodeMeter
Protection Suite
Integrate Once Deliver Many
CodeMeter
License
Central
LL L L
ERP/CRM
e-commerce
CodeMeter
License
Central
Software
License Portal
CmDongle: Storage for Licenses and Keys with highest Security
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 CmCards and CmSticks using:
 CC EAL 4+/5+ certified security controller
 CC EAL 4+/5+ certified crypto libraries
 Extended temperature option
 Market proven CodeMeter firmware
 Combination with flash memory
 Hyperstone flash memory controller
(S6/8, F4, A2)
 Fixed BOM, PCN, long term availability
 Swissbit Qualification and Production
15
CmDongle: Combination of CodeMeter Security and flash memory disk
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 CmCards and CmStick/M open up new use cases:
 Mobile applications (service, forensic, tax, education, industrial, …)
 Delivery media for large data (maps, service documents, databases, …)
 Secure storage of log data
 Use of CmStick/M with HID (no MSD, no BadUSB risk)
 Secure Boot of embedded systems, PLCs, IoT applications
 Retrofitting in brownfield
 Customization: data duplication, key management, OEM label and package, …
16
CmDongle – Highest Security Level with integrated Smart Card Chip
 CmStick/M Industrial and Commercial
 CdRom, CmPublic, CmPrivate, CmSecure
 Supports HID communication (CmSecure)
 Encrypted storage, secure update (no BadUSB risk)
 CmStick/MI 1011-0x-2xx -> Industrial
 128 MB…8 GB SLC flash memory, -40°C…+85°C
 CmStick/MC 1011-0x-4xx -> Commercial
 8 GB…64 GB high-end 2-Bit-eMMC flash memory
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 17
Security with Industrial Flash compared with consumer products
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 18
Applications
Banking & Retail
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 19
Medical & IoT
Industrial Automation and CPS
Banking and Retail: Wincor-Nixdorf
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 20
 Introduction 2009
 CrypTA-User worldwide
 Central administration and
helpdesk using Global
Customer Care Center
 Fulfills requirements
from PCI DSS
 Increase of
service efficiency through
standardized processes
Mobile Forensic Software: Guidance
Guidance
 Mobile Applications
 Secure Logging
 Multi-partition
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 21
Medical (customed, Sirona, …)
 Anti Counterfeiting
 Licensing
 Pay Per Use
 Tamper Protection
(FDA, MPG)
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 22
Gaming
Features:
 Secure Boot from CmCard/CF
 IP Protection for game software
 Tamper Protection for configuration
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 23
Industrial Automation
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"
 CODESYS
 Boot Project Protection
 CodeMeter API
 Source Code Protection
 Bernecker + Rainer
 Technology Guard
 Rockwell
 Source Protection
CSPP
24
1989...2015: More than 25 years in Business
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 25
 Founded in 1989
 By Oliver Winzenried and Marcellus Buchheit
 Headquarters in Germany (Karlsruhe)
 Focus on Protection, Licensing and Security
 Technological leader with international patents
 ISO 9001:2008 certified
WIBU-SYSTEMS worldwide
 Subsidiaries in Seattle, USA – Shanghai and Beijing, China – Belgium
– France – Ireland – Netherlands – Portugal – Spain – UK
 Exclusive distribution partners in Japan – Korea – Russia and many
more countries
 Top 2 vendor in hardware-based protection
 Top 3 vendor in software licensing
 Global Awards
WIBU-SYSTEMS AG
1989...2015: Cooperations and Memberships
 Developer Programs
 R&D Projects
 Organizations
 Standardization
26October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 26
1989...2015: Customers and Partners
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 27
Summary: CodeMeter & Flash Memory in One Device is…
 …perfect for IoT-Devices, Cyber Physical Systems & Embedded Systems
 …space, power and component saving for minimal Total Cost of Ownership
 …reliable and long-term available
 …fitting for the use in the brownfield
 …optimal for tampering protection and IP protection of software and data
 …ideal for the implementation of new business models
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 28
Deutschland: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Deutschland: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Thank you!
Questions? Next Steps? Contact us
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 29

More Related Content

What's hot

Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
Natalia
 
Panda Security: Corporate Presentation
Panda Security: Corporate PresentationPanda Security: Corporate Presentation
Panda Security: Corporate Presentation
Yolanda Ruiz Hervás
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
nmullen
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
kimwisniewski
 
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
Eclipse IoT
 

What's hot (20)

HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
Industrial Internet of Things in a Box
Industrial Internet of Things in a BoxIndustrial Internet of Things in a Box
Industrial Internet of Things in a Box
 
Panda Security: Corporate Presentation
Panda Security: Corporate PresentationPanda Security: Corporate Presentation
Panda Security: Corporate Presentation
 
Dell Technologies Portfolio On One Single Page - POSTER - May 2019
Dell Technologies Portfolio On One Single Page - POSTER - May 2019Dell Technologies Portfolio On One Single Page - POSTER - May 2019
Dell Technologies Portfolio On One Single Page - POSTER - May 2019
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времениПрезентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
 
Industrial IoT and the emergence of Edge Computing Navigating the Technologic...
Industrial IoT and the emergence of Edge Computing Navigating the Technologic...Industrial IoT and the emergence of Edge Computing Navigating the Technologic...
Industrial IoT and the emergence of Edge Computing Navigating the Technologic...
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
 
Attinad Software IoT offerings
Attinad Software IoT offeringsAttinad Software IoT offerings
Attinad Software IoT offerings
 
Оборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТПОборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТП
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
 
Microsoft - Qual o segredo do sucesso em seu projeto embedded?
Microsoft - Qual o segredo do sucesso em seu projeto embedded? Microsoft - Qual o segredo do sucesso em seu projeto embedded?
Microsoft - Qual o segredo do sucesso em seu projeto embedded?
 
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
 
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 

Viewers also liked

Safety & security
Safety & securitySafety & security
Safety & security
Rohit Mohan
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
Safety in hospitals
Safety in hospitalsSafety in hospitals
Safety in hospitals
aranli
 
Hospital security services
Hospital security servicesHospital security services
Hospital security services
Nc Das
 

Viewers also liked (6)

ASIS Chapter 206 Meeting-Safety Vs Security
ASIS Chapter 206 Meeting-Safety Vs SecurityASIS Chapter 206 Meeting-Safety Vs Security
ASIS Chapter 206 Meeting-Safety Vs Security
 
Safety & security
Safety & securitySafety & security
Safety & security
 
SecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management ProjectSecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management Project
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Safety in hospitals
Safety in hospitalsSafety in hospitals
Safety in hospitals
 
Hospital security services
Hospital security servicesHospital security services
Hospital security services
 

Similar to Demystifying Industrial Security

Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
team-WIBU
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
team-WIBU
 
Customer Centric View of Best Practices in Software Monetization
Customer Centric View of Best Practices in Software MonetizationCustomer Centric View of Best Practices in Software Monetization
Customer Centric View of Best Practices in Software Monetization
team-WIBU
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutions
team-WIBU
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
 

Similar to Demystifying Industrial Security (20)

Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
IBM Industrie 4.0 journey @CeBIT
IBM Industrie 4.0 journey @CeBITIBM Industrie 4.0 journey @CeBIT
IBM Industrie 4.0 journey @CeBIT
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
Customer Centric View of Best Practices in Software Monetization
Customer Centric View of Best Practices in Software MonetizationCustomer Centric View of Best Practices in Software Monetization
Customer Centric View of Best Practices in Software Monetization
 
Industrial transformation-simplified-with-mqtt-and-sparkplug
Industrial transformation-simplified-with-mqtt-and-sparkplugIndustrial transformation-simplified-with-mqtt-and-sparkplug
Industrial transformation-simplified-with-mqtt-and-sparkplug
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Velox_Enterprise IT Infra Monitoting Cyber Security Ver 2020_3_1.1.pptx
Velox_Enterprise IT Infra Monitoting Cyber Security Ver 2020_3_1.1.pptxVelox_Enterprise IT Infra Monitoting Cyber Security Ver 2020_3_1.1.pptx
Velox_Enterprise IT Infra Monitoting Cyber Security Ver 2020_3_1.1.pptx
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutions
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity Authentication
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
team-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
team-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
team-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
team-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
team-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
team-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
team-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
team-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
team-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
team-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
team-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
team-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
team-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
team-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
team-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
team-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

Demystifying Industrial Security

  • 1. CodeMeter Security with integrated Industrial Flash Memory Oliver Winzenried CEO WIBU-SYSTEMS AG oliver.winzenried@wibu.com Demystifying Industrial Security October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1
  • 2. Connected World October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 2
  • 3. Changes in IoT and Industrie 4.0, … October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  Stand-Alone Devices  Fixed Features  One-Time Business  Product, Upgrades, Service, Spare parts/consumables, replacement  Only Repair / Maintenance  Individual Hardware TomorrowToday  Connected Devices  Upgradable Features (App Store)  Recurring Revenues  Pay-Per-Use, Pre-Paid, Post-Paid  New Business Models  Shorter Time-to-Market, Cloud  Standard Platforms (HW & SW) 3
  • 4. Challenges October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 4
  • 5. Security versus Safety October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  Safety Protection of humans or environment against risks that come from a (known) technical system  IT Security Protection of a technical system against attacks (unknown) and disruption caused by environment or humans Human / Environment Technical System Technical System Human / Environment 5
  • 6. Challenge: Security Threats Today October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  Manipulation & Tampering  Espionage: Industrial and NSA, Prism, Tempora, …  Cyber-Attacks: Stuxnet, Duqu, Flame, … (German TV, January 2015) 6
  • 7. Challenge: Piracy Problem – Latest Studies October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  German Engineering Federation (VDMA) 2014:  7.9 Billion € piracy losses  9 of 10 companies affected  71% affected by piracy  51% affected by counterfeiting of complete machines  JMF-Study: Japan losses 1.8 times higher  BSA-Study: Losses 63 Billion US$, globally 42% 50% 66% 67% 68% 62% 67% 71% 2003 2006 2007 2008 2010 2012 2014 N=337 Is your company affected by product or brand piracy? Yes: 71% No: 29% 7
  • 8. Opportunities October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" Protection against: IP Theft Hacking Tampering Licensing: License Models Business Models License Management License Deployment 8
  • 9. Why CodeMeter with Flash Memory?  Security and memory in ONE Device  Retrofitting in Brownfield  Cost, Space, Power, … benefits  Highest Reliability & Quality  Excellent components and Partnerships: October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 9
  • 10. Solutions Working Principles October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" Wibu-Systems Solutions & Process Products & Use Cases 10
  • 11. Technical Solutions October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  Know-how Protection -> using data and program code encryption  IP in software, source code, algorithms  IP in embedded systems, PLCs, devices, IoT, data, documents, …  Software and Product Protection -> encryption & unclonable crypto keys  Counterfeiting reduction, prevention of unauthorized use (active and passive)  Flexible Licensing -> using encryption and business process integration  New business models simplify logistics and monetize software  Tamper Protection -> using digital signature  Prevention of manipulation – Cyber-Security – IoT, Industrie 4.0 11
  • 12. Requirements in Industrial Applications  Highest Security for IP and tamper protection:  Users are not the attackers but organized crime, terrorism, competition  Use of secure elements for industrial interfaces and environments  Flexible Storage for multiple licenses  Multiple (device) options and features  Different stake holders and rights owners, i.e. automation or machine supplier, user  Communication Security: Cyber Security  Certificates for OPC UA  Retrofitting October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 12
  • 13. Wibu-Systems Technologies and Solutions October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 13 Software Integration Back Office Integration Protection Suite: Ax/Ex/Ix-Protector CodeMeter License Central  CodeMeter®  Secure Key Storage (Hardware / Software)  De-/Encryption (AES, ECC, RSA)  Flexible License Models  Software Integration  Automatic Code Protection / API  Secure Boot / OPC UA  Back Office Integration  Key and certificate deployment  License deployment  License administration
  • 14. Integrate Once – Deliver Many October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 14 Integration into processes Delivery to the userIntegration into software Software Software CodeMeter Protection Suite Integrate Once Deliver Many CodeMeter License Central LL L L ERP/CRM e-commerce CodeMeter License Central Software License Portal
  • 15. CmDongle: Storage for Licenses and Keys with highest Security October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  CmCards and CmSticks using:  CC EAL 4+/5+ certified security controller  CC EAL 4+/5+ certified crypto libraries  Extended temperature option  Market proven CodeMeter firmware  Combination with flash memory  Hyperstone flash memory controller (S6/8, F4, A2)  Fixed BOM, PCN, long term availability  Swissbit Qualification and Production 15
  • 16. CmDongle: Combination of CodeMeter Security and flash memory disk October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  CmCards and CmStick/M open up new use cases:  Mobile applications (service, forensic, tax, education, industrial, …)  Delivery media for large data (maps, service documents, databases, …)  Secure storage of log data  Use of CmStick/M with HID (no MSD, no BadUSB risk)  Secure Boot of embedded systems, PLCs, IoT applications  Retrofitting in brownfield  Customization: data duplication, key management, OEM label and package, … 16
  • 17. CmDongle – Highest Security Level with integrated Smart Card Chip  CmStick/M Industrial and Commercial  CdRom, CmPublic, CmPrivate, CmSecure  Supports HID communication (CmSecure)  Encrypted storage, secure update (no BadUSB risk)  CmStick/MI 1011-0x-2xx -> Industrial  128 MB…8 GB SLC flash memory, -40°C…+85°C  CmStick/MC 1011-0x-4xx -> Commercial  8 GB…64 GB high-end 2-Bit-eMMC flash memory October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 17
  • 18. Security with Industrial Flash compared with consumer products October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 18
  • 19. Applications Banking & Retail October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 19 Medical & IoT Industrial Automation and CPS
  • 20. Banking and Retail: Wincor-Nixdorf October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 20  Introduction 2009  CrypTA-User worldwide  Central administration and helpdesk using Global Customer Care Center  Fulfills requirements from PCI DSS  Increase of service efficiency through standardized processes
  • 21. Mobile Forensic Software: Guidance Guidance  Mobile Applications  Secure Logging  Multi-partition October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 21
  • 22. Medical (customed, Sirona, …)  Anti Counterfeiting  Licensing  Pay Per Use  Tamper Protection (FDA, MPG) October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 22
  • 23. Gaming Features:  Secure Boot from CmCard/CF  IP Protection for game software  Tamper Protection for configuration October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 23
  • 24. Industrial Automation October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security"  CODESYS  Boot Project Protection  CodeMeter API  Source Code Protection  Bernecker + Rainer  Technology Guard  Rockwell  Source Protection CSPP 24
  • 25. 1989...2015: More than 25 years in Business October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 25  Founded in 1989  By Oliver Winzenried and Marcellus Buchheit  Headquarters in Germany (Karlsruhe)  Focus on Protection, Licensing and Security  Technological leader with international patents  ISO 9001:2008 certified WIBU-SYSTEMS worldwide  Subsidiaries in Seattle, USA – Shanghai and Beijing, China – Belgium – France – Ireland – Netherlands – Portugal – Spain – UK  Exclusive distribution partners in Japan – Korea – Russia and many more countries  Top 2 vendor in hardware-based protection  Top 3 vendor in software licensing  Global Awards WIBU-SYSTEMS AG
  • 26. 1989...2015: Cooperations and Memberships  Developer Programs  R&D Projects  Organizations  Standardization 26October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 26
  • 27. 1989...2015: Customers and Partners October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 27
  • 28. Summary: CodeMeter & Flash Memory in One Device is…  …perfect for IoT-Devices, Cyber Physical Systems & Embedded Systems  …space, power and component saving for minimal Total Cost of Ownership  …reliable and long-term available  …fitting for the use in the brownfield  …optimal for tampering protection and IP protection of software and data  …ideal for the implementation of new business models October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 28
  • 29. Deutschland: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Deutschland: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Thank you! Questions? Next Steps? Contact us October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 29

Editor's Notes

  1. IIC (auch mit Advanced Manufacturing aus Militärforschung) Made in China 2025