Minute Read: 4 minutes

How HALOCAD addresses Data Security challenges across PLM and Multi-CAD integrations

Modern-day product development is highly complex. This is because industry competition has driven enterprises to focus mainly on their core competencies while they outsource other activities to their partner organizations specialized in such activities.
Therefore, in today’s diversified global economy we find that almost all enterprises operate with their operations dispersed across internal productions and external partners. This approach often results in faster product development, lower development costs, and improved quality.
However, it also leads to a complex web of distributed collaboration between internal production and external vendors. This complex web of collaboration calls for Product Lifecycle Management (PLM) systems to streamline the flow of product-related information along all stages of the product lifecycle.

PLM is defined as “a strategic business approach that applies a consistent set of business solutions in support of the collaborative creation, management, dissemination, and use of product definition information across the extended enterprise from concept to end of life – integrating people, processes, business systems, and information”.

PLM provides a shared platform that connects various participating entities of the product. Product development brings with it many changes due to customer demand, changes in design, errors in planning, and resource availability. Thus, it deals with an enormous quantity of data that is dynamically shared, readily accessible, and also secure.

Data security challenges in PLM systems

As we have seen earlier, PLM systems engage multiple partners, and data is dispersed across multiple entities and is not under the control of a single enterprise or owner.

Every PLM system is characterized by a high level of data complexity, data richness, and dependencies. Information about the product, materials, BOMs, suppliers, etc. is significantly intertwined.

To protect complex content is not easy plus the need to be compliant with multiple business and technical requirements. All this makes data security in PLM systems very complicated.

Secondly, each entity in PLM has its own trusted domain but when this data leaves this domain, there is little or no control over this data. The threat of shared data being compromised is one of the key risks in PLM systems.

Thirdly, we cannot assume that network-level security and application-centric data protection are enough to protect data in PLM systems. This is because internal theft occurs easily as users are authorized to have access to sensitive information and also the control is lost once downloaded by an authorized user.

Moreover, contractors, design partners, suppliers, vendors, tier 1 and tier2 part manufacturers who are essentially outside the system require access to sensitive intellectual property. This opens the door for cyberattacks and therefore, data protection has to happen within the PLM systems.

Last but not the least, many designers operate in different Computer-Aided-Design (CAD) environments. Data exchanges between the different CAD and PLM systems are generally not smooth. Let’s look at this in detail.

CAD and PLM integration Challenges

Designers and manufacturers operate in a highly dynamic environment. Every design includes highly intricate information and an enormous amount of technical data that must be shared between the various parties to generate accurate design and product development.

Accurate information exchange is critical to maintain a single version during manufacturing and any inconsistency will result in not only flawed production but also lead to huge financial loss.

In the market, there are so many different CAD file formats existing and unless there is proper integration and collaboration, data being shared can be misused by cyber attackers. Each time there is a cyberattack, it clearly shows how vulnerable these systems are and just how valuable these data are for hackers.

ALSO READ | Three Simple Tips to Keep Your CAD Files Safe and Secure

The recent cyberattack on the Canadian plane maker Bombardier revealed unauthorized parties accessed and extracted data by exploiting a vulnerability affecting a third-party file-transfer application.

The manufacturing industry bore the brunt of data thefts attacks in 2020, experiencing 33% of data theft incidents.

Every design and manufacturing industry must apply a data-centric perspective to protect their sensitive information and not just depend on perimeter security.

Digital Rights Management (DRM) technologies are evolving to address the CAD/PLM integration limitations and make them more effective and easier to integrate.

ALSO READ | How to Secure your Design IP in your PLM environment

How HALOCAD meets CAD/PLM integration challenges

SECUDE’s HALOCAD DRM now extends data-centric security across PLM and Multi-CAD integrations. It now supports the following PLM Multi-CAD integrations:

  • HALOCAD® Add-on for Siemens Teamcenter – NX Integration
  • HALOCAD® Add-on for Siemens Teamcenter – SolidEdge Integration
  • HALOCAD® Add-on for Siemens Teamcenter – SolidWorks Integration
  • HALOCAD® Add-on for Siemens Teamcenter – Creo Integration
  • HALOCAD® Add-on for SAP ECTR – AutoCAD Integration
  • HALOCAD® Add-on for SAP ECTR – Creo Integration
  • HALOCAD® Add-on for SAP ECTR – SolidEdge Integration
  • HALOCAD® Add-on for AutoDesk Vault – AutoCAD Integration
  • HALOCAD® Add-on for AutoDesk Vault – Inventor Integration

Watch HALOCAD in action

Key benefits of HALOCAD DRM solution

The following are the key benefits of using HALOCAD Digital Rights Management Solution:

  • It leverages single-source of truth in PLM and provides a holistic encryption strategy across CAD integrations
  • Strengthens PLM multi-CAD integration with data protection using AIP
  • Supports encryption for CAD translator file types (IGES, STEP, etc) and facilitates interoperability across CAD platforms.

To know more about how SECUDE can help with your CAD/PLM integration challenges or to request a DEMO write to

References:

  1. https://www.gerbertechnology.com/fr-fr/actualit%C3%A9/the-competitive-advantages-of-cad-plm-integration/
  2. https://www.industryweek.com/technology-and-iiot/article/21156122/bombardier-suffers-cyber-attack
  3. Protecting PLM Data through their lifecycle – Rohit Ranchal, and Bharat Bhargava, Purdue University, USA

 

Comments are closed.