Tag Archives: cloud

Phoenix Contact mGuard Secure Cloud

From |

What is Cloud Computing and why have people started to use it?

The usage of the internet has increased massively in last few years, which increases the cost of hardware and software. The new technology of Cloud Computing has been used to solve all these issues by providing online service, which reduces the cost of hardware and software effectively.

Cloud Computing is architecture or it can be defined as a type of internet service, which is designed to provide shared resources and computing services via the internet on demand over centralized server resources on a scalable platform. Cloud Computing allows customers to share resources like networks, storage, servers, services and applications without physical devices, on a pay-per-use basis.

There are three major cloud computing service categories:

Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
These are applications hosted by third party providers. Customers are able to use them over the internet.

Pay-as-you-use model.

Examples:

Salesforce, NetSuite

Third-party application development platform and services built on its own infrastructure.

Again these tools are made available to customers over the internet.

Examples:

Google App Engine, AWS Lambda

Third-party servers, storage, computing resources available for customers. Customers can use IaaS to build their own PaaS and SaaS service.

Examples:

Google Cloud Compute, Amazon S3

Major security issues on implementing Cloud Computing Services

Cloud Computing is known as an emerging domain, the security of the data must be protected over the network. There are many issues in cloud computing but security is the major issue.

  • Misuse of Cloud Computing

Some criminals like Hackers and spammers can take advantage of the suitable registration, easy procedures and unspecified access to cloud services to launch malicious attacks like key cracking.

  • Insecure Application Programming Interfaces (API)

Customers handle and interact with cloud services by interfaces or API. Service providers must make sure that the security is integrated into their service models, while users must be aware of the security risks.

  • Wicked Insiders

Malicious insiders pose a greater threat in the Cloud Computing environment because consumers do not understand the providers’ policies and procedures. Malicious insiders may gain unauthorized access to the organization and its assets.

  • Shared Technology issues/multi-tenancy nature

This is based on a shared infrastructure and does not apply to multi-tenant architectures.

  • Data Crash

Compromised data may include deleted or changed data without backup, unrecorded with larger environments, lost encoded keys and illegal access to sensitive data.

  • Account, Service & Traffic hijacking

Account or service hijacking is usually done using stolen certificates. Such attacks include phishing, fraud, and exploitation of software vulnerabilities. Attackers can access key areas of Cloud Computing services such as confidentiality, integrity and service availability.

  • Unidentified Risk Report

Cloud services mean that organizations are less involved in software and hardware, so organizations should be aware that internal security, security compliance, auditing and logging issues may be overlooked.

Phoenix Contact mGuard Secure Cloud

A simple, secure, reliable solution to risks

mGuard VPN technology uses IPsec security protocols with strong encryption. This guarantees the confidentiality, authenticity and integrity of all information and data transmitted between the service personnel and the machine.

For any demo request or enquiry, feel free to contact us at marketing@phoenixcontact.com.sg!

CLOUD IoT GATEWAY – The Smart Gateway for IoT Solutions

From |

The CLOUD IoT Gateway is designed to allow users to integrate their existing systems into the cloud. Machines and physical infrastructures can now be connected to the digital world. This will allow users to implement applications such as big data, condition monitoring and comprehensive data analysis. With protocols such as Modbus/TCP supported, the IoT gateway enables an easy process of connection.  No additional engineering software is required as the parameter configuration can be easily carried out at the gateway using web-based management.

Key benefits to users

  • Direct connection to the cloud for data analysis
  • No learning of new software – configuration is done via web-based management
  • Existing devices with Modbus/TCP can be connected to cloud
  • Robust hardware for usage in industrial environment
  • Secured transmission using TLS encryption (Transport Layer Security)

Interested to see how this works? Feel free to request a demonstration by dropping us an email at marketing@phoenixcontact.com.sg!

Future Proofing Industry Seminar in Yangon, Myanmar

From |

Our slogan: “Inspiring Innovations”. It embodies what we do – Phoenix Contact never fails to come up with new and innovative products for the industry. As such, we are honored to be one of the market leaders and trendsetters of our industry.

Together with our partner in Myanmar, Synopsis Technology, we were proud to have brought you the “Future Proofing Industry” Seminar, held on the 31st of May 2018 at Lotte Hotel Yangon.

Seminar Poster

Alongside the topic of driving innovations, the main highlight of this “Future Proofing Industry” seminar was to introduce new applications and products for the education sector in Myanmar. It is of paramount importance to help the future engineers be ready for the industry.

Within the short time span of a day, we were elated that we had the opportunity to share our company history and actual success stories across South East Asia. Aside from that, we managed to introduce our innovative products as well.

First speaker: Mr Jiang

Our first speaker, Mr Jiang, who is also our Solution Manager, spoke about our new Industrial Cloud and Networking products for the first half of the seminar. Ideas and experiences were shared with the attendees.

Second speaker: Mr Maw Kon

The second speaker of the day was Mr Maw Kon, who is from Phoenix Contact Myanmar. He introduces our bread and butter products – the various connectors ranging from Terminal blocks to heavy duty connectors.

Third and final speaker: Mr Gary

Our last speaker, Mr Gary, never fails to draw the attentions of the attendees when it comes to introducing our surge protection devices. Live demonstrations and interactive activities were carried out and our attendees were all having a blast.

Last but not least, there was a mini competition held during the seminar.  All the attendees were encouraged to participate in the #futureproofingseminar and @phoenixcontactsea photoshoots. All they needed to do was to just take a photo during the seminar and upload them on their Facebook with the hashtag #futureproofingseminar together with a tag @phoenixcontactsea! The winner of the seminar was announced via our official Facebook page!