{"id":2737,"date":"2019-10-25T07:12:12","date_gmt":"2019-10-25T05:12:12","guid":{"rendered":"https:\/\/staging.blogs.yokogawa.de\/chemical-pharma\/uncategorized\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/"},"modified":"2025-03-14T11:27:58","modified_gmt":"2025-03-14T10:27:58","slug":"converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3","status":"publish","type":"post","link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/","title":{"rendered":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3"},"content":{"rendered":"<p>The following blog article is the second of three parts (<strong><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/?p=11459\">to the first part<\/a><\/strong>) and deals with the topic &#8220;Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies&#8221;.<\/p>\n<h2><strong>Simple visualization of existing plant network architecture<\/strong><\/h2>\n<p>Yokogawa\u2019s network specialist team worked closely with Hyogo Pulp to screen and understand the current state of the plant-wide network. From the office area to the field equipment such as the computer room, the plant control room, and the electrical room, physical network cables were investigated. This entailed checking the network inventory list and the system architecture diagram against the current configuration, and the settings of individual components such as firewalls and switches were unraveled.<br \/>\nIn addition, the customer\u2019s current challenges and requirements were analyzed through interviews with the employees responsible. The challenges for IT infrastructure management included the deployment of secure wireless access points and guest Wi-Fi. Among the future requirements specified for the network were the management of increasing numbers of IT assets and efficient network utilization.<br \/>\nUser-friendly, intuitive operation and management were designed based on the customer\u2019s actual situation, challenges and requirements regarding the operation of the plant IT infrastructure.<br \/>\nYokogawa\u2019s proposal was a state-of-art approach to the plant network. It was based on viable technologies, with new network policies anticipating future visions. A virtual network using SDN technology was introduced, virtually integrating existing network cables and equipment. This was achieved without making any physical changes, creating a new, secure and intelligent network.<\/p>\n<figure id=\"attachment_11576\" aria-describedby=\"caption-attachment-11576\" style=\"width: 877px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\" wp-image-11576\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo5-300x187.jpg\" alt=\"\" width=\"877\" height=\"547\" \/><figcaption id=\"caption-attachment-11576\" class=\"wp-caption-text\">Yokogawa\u2019s Industrial Network Security Solutions<\/figcaption><\/figure>\n<h2><strong>Virtual Network<\/strong><\/h2>\n<p>In the beginning, Yokogawa assessed the plant network and sorted out the network communications required for each segment such as the office area and control room, in order to develop a network policy to connect and secure the plant network. Then, the logical configuration of the entire plant network was designed and implemented using SDN virtual network technology. This allowed the most to be made of the existing asset.<br \/>\nThe switchover from the conventional network to the virtual network was completed in about 30 minutes without any problems. Minimizing the impact on running plant operations is one of the great benefits of virtual networking.<\/p>\n<p>In addition to anti-spam and conventional anti-virus measures, the Intrusion Detection System (IDS) and Log Collection and Analysis tools were also introduced to enable real-time monitoring of the network. Thanks to IT Asset Management tools, it is now possible to easily understand and manage the devices connected to the network. The access and security status of each device can be monitored efficiently in this way.<br \/>\nSecure wireless access points with appropriate access rights and guest Wi-Fi have now become available in all areas required. That dramatically improves security and convenience.<\/p>\n<h2><strong><img decoding=\"async\" class=\" wp-image-11583 alignleft\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo6-188x300.jpg\" alt=\"\" width=\"406\" height=\"647\" \/>Plant Network Security Monitoring Service <\/strong><\/h2>\n<p>Yokogawa\u2019s \u201cPlant Network Security Monitoring Service\u201d was implemented to manage the operation of the new network as smoothly as possible. If a network failure or a security threat occurs, immediate action must be taken. Hyogo Pulp decided to rely on Yokogawa\u2019s Plant Network Security Monitoring Service and allocated the company\u2019s limited human resources accordingly, to permit higher value-added to be achieved.<\/p>\n<p>This service enables network specialists at Yokogawa to continuously monitor the customer\u2019s plant network through secure remote access, and to act as if they were Hyogo Pulp\u2019s IT department. If an abnormality or threat is detected, it is immediately notified to Customer Service by means of predetermined procedures. Day-to-day equipment configuration changes are made at the customer\u2019s site. However, when performing difficult configuration tasks or correcting abnormalities, the customer and Yokogawa discuss together while sharing the status of the network infrastructure. In some cases, Yokogawa remotely assists the customer with configuration changes.<\/p>\n<p>In this way, Hyogo Pulp can easily maintain and manage the secure network infrastructure, and instead focus on reliable plant operation as well as new initiatives to improve productivity.<\/p>\n<hr \/>\n<p><em>In the following third part of this blog article about &#8220;Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies&#8221; it will be about the Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department\u2019s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section.<\/em><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-11474\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Grafik3-300x143.png\" alt=\"\" width=\"359\" height=\"171\" \/><\/p>\n<hr \/>\n<blockquote class=\"wp-embedded-content\" data-secret=\"gBNj68lOh2\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/optimization-en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-1-3\/\">Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 1 \/ 3<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 1 \/ 3&#8221; &#8212; Chemical Pharma Blog\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/optimization-en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-1-3\/embed\/#?secret=tYkckBMzem#?secret=gBNj68lOh2\" data-secret=\"gBNj68lOh2\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"qPtCXyAsPh\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/security-en\/digital-ambition-key-aspect-plant-security\/\">Digital ambition \u2013 key aspect Plant Security<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Digital ambition \u2013 key aspect Plant Security&#8221; &#8212; Chemical Pharma Blog\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/security-en\/digital-ambition-key-aspect-plant-security\/embed\/#?secret=5e6nIXU8ek#?secret=qPtCXyAsPh\" data-secret=\"qPtCXyAsPh\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"3ncebj5M5j\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/safety-security-en\/crucial-basic-measures-to-ensure-business-resilience-part-1-2\/\">Crucial basic measures to ensure business resilience (Part 1\/2)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Crucial basic measures to ensure business resilience (Part 1\/2)&#8221; &#8212; Chemical Pharma Blog\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/safety-security-en\/crucial-basic-measures-to-ensure-business-resilience-part-1-2\/embed\/#?secret=Bxm3gJDaan#?secret=3ncebj5M5j\" data-secret=\"3ncebj5M5j\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our new three-part blog article deals with the topic &#8220;Converging and Securing OT-IT &#8211; Enabling Industrial Network Security Solutions for Use With Key Technologies&#8221;. Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and&hellip; <\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\"> <span class=\"screen-reader-text\">Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":117,"featured_media":9934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","footnotes":""},"categories":[56,59],"tags":[82,704,705,706,710,681,707,139,711,494,95,486,603,442,67,708,406,712,283,113,444,100,665,73,215,605,74,709,657],"coauthors":[693],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 - Chemical Pharma Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3\" \/>\n<meta property=\"og:description\" content=\"Our new three-part blog article deals with the topic &quot;Converging and Securing OT-IT - Enabling Industrial Network Security Solutions for Use With Key Technologies&quot;. Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and&hellip;  Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Chemical Pharma Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T05:12:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T10:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"639\" \/>\n\t<meta property=\"og:image:height\" content=\"311\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fatma Evren\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\"},\"author\":{\"name\":\"Fatma Evren\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad\"},\"headline\":\"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3\",\"datePublished\":\"2019-10-25T05:12:12+00:00\",\"dateModified\":\"2025-03-14T10:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\"},\"wordCount\":751,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"keywords\":[\"Automation\",\"Enterprise resource planing\",\"ERP\",\"Hyogo Pulp Industries\",\"IDS\",\"IIoT\",\"Industrial Network Security Solutions\",\"Industry 4.0\",\"Intrusion Detection System\",\"IoT\",\"IT\",\"IT\/OT\",\"Network\",\"Operator\",\"Optimisation\",\"PCD\",\"plant\",\"Plant network security\",\"Plant Security\",\"plants\",\"process\",\"process industry\",\"Productivity\",\"Safety\",\"Safety system\",\"SDN\",\"Security\",\"Software defined Network\",\"Technology\"],\"articleSection\":[\"Optimisation\",\"Safety &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\",\"name\":\"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 - Chemical Pharma Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\"},\"datePublished\":\"2019-10-25T05:12:12+00:00\",\"dateModified\":\"2025-03-14T10:27:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"name\":\"Chemical Pharma Blog\",\"description\":\"Yokogawa&#039;s Chemical &amp; Pharma Blog\",\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\",\"name\":\"Chemical Pharma Blog\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"width\":302,\"height\":89,\"caption\":\"Chemical Pharma Blog\"},\"image\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad\",\"name\":\"Fatma Evren\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/705d9e7d4dc124ce066ce1502b785235\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g\",\"caption\":\"Fatma Evren\"},\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 - Chemical Pharma Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/","og_locale":"en_US","og_type":"article","og_title":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3","og_description":"Our new three-part blog article deals with the topic \"Converging and Securing OT-IT - Enabling Industrial Network Security Solutions for Use With Key Technologies\". Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and&hellip;  Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 Read More &raquo;","og_url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/","og_site_name":"Chemical Pharma Blog","article_published_time":"2019-10-25T05:12:12+00:00","article_modified_time":"2025-03-14T10:27:58+00:00","og_image":[{"width":639,"height":311,"url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg","type":"image\/jpeg"}],"author":"Fatma Evren","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#article","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/"},"author":{"name":"Fatma Evren","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad"},"headline":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3","datePublished":"2019-10-25T05:12:12+00:00","dateModified":"2025-03-14T10:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"keywords":["Automation","Enterprise resource planing","ERP","Hyogo Pulp Industries","IDS","IIoT","Industrial Network Security Solutions","Industry 4.0","Intrusion Detection System","IoT","IT","IT\/OT","Network","Operator","Optimisation","PCD","plant","Plant network security","Plant Security","plants","process","process industry","Productivity","Safety","Safety system","SDN","Security","Software defined Network","Technology"],"articleSection":["Optimisation","Safety &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/","name":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3 - Chemical Pharma Blog","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website"},"datePublished":"2019-10-25T05:12:12+00:00","dateModified":"2025-03-14T10:27:58+00:00","breadcrumb":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/converging-and-securing-ot-it-enabling-industrial-network-security-solutions-for-use-with-key-technologies-2-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/"},{"@type":"ListItem","position":2,"name":"Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies 2 \/ 3"}]},{"@type":"WebSite","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","name":"Chemical Pharma Blog","description":"Yokogawa&#039;s Chemical &amp; Pharma Blog","publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization","name":"Chemical Pharma Blog","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","width":302,"height":89,"caption":"Chemical Pharma Blog"},"image":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad","name":"Fatma Evren","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/705d9e7d4dc124ce066ce1502b785235","url":"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g","caption":"Fatma Evren"},"url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg",639,311,false],"thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7-150x150.jpg",150,150,true],"medium":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7-300x146.jpg",300,146,true],"medium_large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg",639,311,false],"large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg",639,311,false],"1536x1536":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg",639,311,false],"2048x2048":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7.jpg",639,311,false],"post-thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/SuccessStoryHyogo7-356x200.jpg",356,200,true]},"uagb_author_info":{"display_name":"Fatma Evren","author_link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/"},"uagb_comment_info":1,"uagb_excerpt":"Our new three-part blog article deals with the topic \"Converging and Securing OT-IT - Enabling Industrial Network Security Solutions for Use With Key Technologies\". Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and&hellip; Converging and Securing OT-IT \u2013 Enabling Industrial Network Security Solutions for Use With Key Technologies&hellip;","_links":{"self":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2737"}],"collection":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/comments?post=2737"}],"version-history":[{"count":2,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2737\/revisions"}],"predecessor-version":[{"id":11150,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2737\/revisions\/11150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media\/9934"}],"wp:attachment":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media?parent=2737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/categories?post=2737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/tags?post=2737"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/coauthors?post=2737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}