{"id":41166,"date":"2024-09-28T15:57:09","date_gmt":"2024-09-28T19:57:09","guid":{"rendered":"https:\/\/netfoundry.io\/?post_type=resources&#038;p=41166"},"modified":"2024-10-14T09:03:21","modified_gmt":"2024-10-14T13:03:21","slug":"unified-namespace-and-secure-connectivity-transforming-industrial-data-management","status":"publish","type":"resources","link":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/","title":{"rendered":"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41166\" class=\"elementor elementor-41166\" data-elementor-post-type=\"resources\">\n\t\t\t\t<main class=\"elementor-element elementor-element-b7dad45 e-con-full e-flex e-con e-parent\" data-id=\"b7dad45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34a0920 e-grid e-con-boxed e-con e-child\" data-id=\"34a0920\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a068ac elementor-widget elementor-widget-global elementor-global-31993 elementor-widget-jet-breadcrumbs\" data-id=\"1a068ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-breadcrumbs jet-blocks\">\n\t\t<div class=\"jet-breadcrumbs\">\n\t\t<div class=\"jet-breadcrumbs__content\">\n\t\t<div class=\"jet-breadcrumbs__wrap\"><div class=\"jet-breadcrumbs__item\"><a href=\"https:\/\/netfoundry.io\/\" class=\"jet-breadcrumbs__item-link is-home\" rel=\"home\" title=\"NetFoundry\">NetFoundry<\/a><\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30df123 elementor-widget elementor-widget-heading\" data-id=\"30df123\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Unified Namespace and Secure Connectivity: Transforming Industrial Data Management<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afdb130 elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"afdb130\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><a href=\"https:\/\/netfoundry.io\/resource-categories\/white-papers\/\" class=\"jet-listing-dynamic-terms__link\">White Paper<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d35d8e e-grid e-con-boxed e-con e-child\" data-id=\"0d35d8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cc00323 e-grid e-con-full e-con e-child\" data-id=\"cc00323\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-680b055 e-con-full e-flex e-con e-child\" data-id=\"680b055\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f1b80 elementor-widget elementor-widget-image\" data-id=\"a3f1b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"804\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-41164\" alt=\"NetFoundry | Unified Namespace and Secure Connectivity: Transforming Industrial Data Management\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg 1536w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management-300x157.jpg 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management-1024x536.jpg 1024w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management-768x402.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20eb1fd gray elementor-widget elementor-widget-text-editor\" data-id=\"20eb1fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What Is A Unified Namespace<\/h2><p><span style=\"font-weight: 400;\">Unified Namespace, or UNS is a concept born primarily of the <\/span><a href=\"https:\/\/www.isa.org\/standards-and-publications\/isa-standards\/isa-standards-committees\/isa95\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ANSI_ISA-95<\/span><\/a><span style=\"font-weight: 400;\"> standard\u2019s Equipment Hierarchy Model<\/span> <span style=\"font-weight: 400;\">and extended well beyond it to encompass the entire enterprise. The purpose of UNS is to provide a unified approach to the collection and distribution of the current state of industrial and manufacturing environments in an event driven system. To do this, information is collected from points throughout the environment, control systems, shipping systems, ordering, personnel, etc. This information is sent via broker agents to other subscribing systems, including other brokers, unifying the data set across the enterprise in near real time. Having this single architecture for information collection and distribution empowers decision making and planning in ways that have not been realized before, and simplifies the operations and response to events.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d30388a e-con-full e-flex e-con e-child\" data-id=\"d30388a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-272edba e-con-full e-flex e-con e-child\" data-id=\"272edba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e837ac3 elementor-widget elementor-widget-heading\" data-id=\"e837ac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secure UNS Connectivity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0681c5 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"e0681c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Unified Namespace combined with zero trust connectivity can be the transformative solution you are looking for to integrate your industrial data.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c5aa2e gray elementor-widget elementor-widget-text-editor\" data-id=\"7c5aa2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Unified Namespace (UNS) requires secure, agile connectivity like NetFoundry&#8217;s Ziti for success because it enables <\/span><b>seamless, real-time data flow across diverse and often geographically dispersed industrial environments<\/b><span style=\"font-weight: 400;\"> while ensuring <\/span><b>data security, integrity, and compliance<\/b><span style=\"font-weight: 400;\"> with standards like IEC 62443.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d689615 e-grid e-con-full e-con e-child\" data-id=\"d689615\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df81c elementor-widget elementor-widget-shortcode\" data-id=\"55df81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5058f39 e-grid e-con-boxed e-con e-child\" data-id=\"5058f39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9d2f66 e-grid e-con-full e-con e-child\" data-id=\"b9d2f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-78c016f e-con-full e-flex e-con e-child\" data-id=\"78c016f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9436d4a elementor-widget elementor-widget-heading\" data-id=\"9436d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Streamlined UNS Deployment\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a0e10 elementor-widget elementor-widget-text-editor\" data-id=\"65a0e10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"ad2a83ae-afdd-40c7-98f3-e29914e0433c\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Leverage NetFoundry for secure, agile connectivity in evolving Unified Namespace implementations.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4df39c3 e-con-full e-grid e-con e-child\" data-id=\"4df39c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e892d6f elementor-widget elementor-widget-heading\" data-id=\"e892d6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Using an Overlay Network To Integrate Disparate Data\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b49d9 gray elementor-widget elementor-widget-text-editor\" data-id=\"47b49d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As the purpose of a UNS implementation is to collect information from, and distribute information to, disparate sources, an<\/span> <a href=\"https:\/\/netfoundry.io\/netfoundry-cloud-naas\/what-is-overlay-networking\/\"><span style=\"font-weight: 400;\">overlay network<\/span><\/a><span style=\"font-weight: 400;\"> can assist in the evolution towards a full UNS system. Protocols, like <\/span><a href=\"https:\/\/corsosystems.com\/posts\/mqtt-and-sparkplug-b-simplified\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Sparkplug B,<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/opcfoundation.org\/about\/opc-technologies\/opc-ua\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">OPC UA<\/span><\/a><span style=\"font-weight: 400;\"> have been created and evolved to provide a common format for delivering information, however, the transport of this data must still meet the needs and capabilities of the sources and the facilities.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We propose the use of the <\/span><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\"><span style=\"font-weight: 400;\">NetFoundry Platform<\/span><\/a><span style=\"font-weight: 400;\"> (Also Available as A Service via <\/span><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/netfoundry-cloud\/\"><span style=\"font-weight: 400;\">NetFoundry Cloud<\/span><\/a><span style=\"font-weight: 400;\">) as a solution to serve UNS deployment and evolution, in a manner that meet the requirements of <\/span><a href=\"https:\/\/netfoundry.io\/ot\/netfoundry-supports-iec-62443\/\"><span style=\"font-weight: 400;\">IEC 62443<\/span><\/a><span style=\"font-weight: 400;\"> and other standards, enabling the secure and rapid deployment of data sources and sinks and their connections to the brokers regardless of underlying network architectures. The agility, flexibility, high availability, and completeness of operations makes NetFoundry and Ziti an easy choice for UNS and other industrial connectivity needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5cc52f e-grid e-con-full e-con e-child\" data-id=\"e5cc52f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b25174 elementor-widget elementor-widget-shortcode\" data-id=\"6b25174\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3990f99 e-grid e-con-boxed e-con e-child\" data-id=\"3990f99\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9b487cd e-grid e-con-full e-con e-child\" data-id=\"9b487cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a482c79 e-con-full e-grid e-con e-child\" data-id=\"a482c79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee51f6 elementor-widget elementor-widget-heading\" data-id=\"1ee51f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Do We Need UNS?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42145df gray elementor-widget elementor-widget-text-editor\" data-id=\"42145df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">UNS provides several benefits when implemented that can make enterprises more efficient in their business, while simplifying operations and the supporting processes. With a consistent approach, organizations can utilize their own data to make better decisions,normalize <\/span><span style=\"font-weight: 400;\">[DS3] <\/span><span style=\"font-weight: 400;\">the data access methods for dependent systems, scale up to meet demands, and streamline workflows. A properly designed and implemented UNS system will also offer easier security policy enforcement, compliance and reduce integration costs. These benefits have been realized within nonindustrial spaces for years, and while there are fundamental differences in the information systems of IT and OT, the benefits are attainable while maintaining the security and availability required of OT environments.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b5d254 e-con-full e-flex e-con e-child\" data-id=\"7b5d254\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f54ed9 elementor-widget elementor-widget-heading\" data-id=\"4f54ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Transformative Benefits of UNS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8251d96 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"8251d96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"d77104a9-e987-48ad-b7ec-2de6f7836a14\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Unlock efficiency and scalability with Unified Namespace, enhancing operations and security compliance.<\/p><\/div><\/div><\/div><\/div><div class=\"mb-2 flex gap-3 empty:hidden -ml-2\"><div class=\"items-center justify-start rounded-xl p-1 flex\"><div class=\"flex items-center\"><div class=\"flex items-center pb-0\">\u00a0<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9877476 e-grid e-con-full e-con e-child\" data-id=\"9877476\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73cca78 elementor-widget elementor-widget-shortcode\" data-id=\"73cca78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-132abfc e-grid e-con-boxed e-con e-child\" data-id=\"132abfc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dbd8243 e-grid e-con-full e-con e-child\" data-id=\"dbd8243\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-af4738c e-con-full e-flex e-con e-child\" data-id=\"af4738c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7aedb21 elementor-widget elementor-widget-heading\" data-id=\"7aedb21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Bridging Enterprise and Industrial Data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30ed715 elementor-widget elementor-widget-text-editor\" data-id=\"30ed715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"59602f88-4989-4c67-bf1e-f67eb7bb08b3\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>UNS simplifies integration across layers, enhancing security and agility in industrial networking.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0994c3b e-con-full e-grid e-con e-child\" data-id=\"0994c3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfb337 elementor-widget elementor-widget-heading\" data-id=\"2cfb337\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Friction In Implementing UNS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b1ca1d gray elementor-widget elementor-widget-text-editor\" data-id=\"9b1ca1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">UNS combines enterprise and industrial data. While this has always been true, the networking in manufacturing and industry has often been based around the <\/span><a href=\"https:\/\/www.energy.gov\/sites\/default\/files\/2022-10\/Infra_Topic_Paper_4-14_FINAL.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Purdue model<\/span><\/a><span style=\"font-weight: 400;\">, with strict controls <\/span><span style=\"font-weight: 400;\">[DS4] <\/span><span style=\"font-weight: 400;\">per layer of the model to protect the safety and availability of the system. This makes the integration of devices at the edge of the process difficult, due to the complexities of the separation of each layer. However, the Purdue model is an information architecture not a networking model and standards such as IEC 62443 provide guidance that allows the communication to flow directly, or via appropriate brokers for those systems not capable of utilizing the protocols, wherever they might exist within the network, connecting zones via conduits. Of course, the communications of these systems must maintain the safety and security of the system as a whole. They also need to be agile and scale, as well as provide all the functions to be operated efficiently and resiliently.<\/span><\/p><p><span style=\"font-weight: 400;\">The<\/span><a href=\"https:\/\/isagca.org\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">ISAGCA<\/span><\/a><span style=\"font-weight: 400;\"> has written a recent paper on the application of IEC 62443 and cloud based systems,<\/span><\/p><p><span style=\"font-weight: 400;\">\u201c<\/span><a href=\"https:\/\/www.isasecure.org\/hubfs\/2022%20ISA%20Website%20Redesigns\/ISASecure\/PDFs\/IIoT%20System%20Certification%2062443%20Paper_ISASecure_ISAGCA.pdf?hsLang=en\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">IIoT System Implementation and Certification Based on ISA\/IEC 62443 Standards<\/span><\/a><span style=\"font-weight: 400;\">\u201d . While UNS does not require cloud assets, it is a good example of the appropriate way to analyze risk for these types of systems, and some UNS clients applications or enterprise level brokers may certainly exist in the cloud.\u00a0 The<\/span><a href=\"https:\/\/www.automation.com\/getmedia\/5b6e09c0-e2c0-4639-aff3-de3925709255\/IIoT-System-Certification-62443-Paper_ISASecure_ISAGCA.pdf?ext=.pdf\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">paper<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/isasecure.org\/isasecure-isa\/isa\/iiot-system-implementation-and-certification-for-cloud-based-functionality-based-on-isa-iec-62443-standards\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">accompanying webinar<\/span><\/a><span style=\"font-weight: 400;\"> cover the various types of processes and the analysis of the risks deeply, with recommendations for implementation as well as future work for various working groups. The image below from the paper shows the various data usage models they investigated as part of the study.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-376f64e e-grid e-con-full e-con e-child\" data-id=\"376f64e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10f6602 elementor-widget elementor-widget-shortcode\" data-id=\"10f6602\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc03e81 e-grid e-con-boxed e-con e-child\" data-id=\"cc03e81\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16517dc e-grid e-con-full e-con e-child\" data-id=\"16517dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fac74b5 e-con-full e-grid e-con e-child\" data-id=\"fac74b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b78cf60 elementor-widget elementor-widget-heading\" data-id=\"b78cf60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securing UNS with IEC 62443 Compliance via Virtual Conduits<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b46bea8 gray elementor-widget elementor-widget-text-editor\" data-id=\"b46bea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The findings of the study identified those functions that, if placed in the cloud, would fall under the scope of IEC 62443 requirements. As one can see, the simple sending of data to a cloud based system for reasons outside the process being monitored, or to analyze and present data to a human operator who acts independently of the system are considered out of scope for the security requirements of the standard. When any information is sent from the cloud based system to the actual process, the cloud zones are in scope.<\/span><\/p><p><span style=\"font-weight: 400;\">UNS, as a data collection and distribution model, is similar, and generally outside the scope of the existing standards. That said, the implementation of UNS must meet the overall security requirements of the environment it is in, and this will have large portions covered by the standard&#8217;s requirements. There is also a high likelihood that the UNS may become part of a larger solution in the examples to the right. While it would be up to the risk assessment to scope the components in or out, it makes sense to treat them as if they fall under the standard from the beginning.<\/span><\/p><p><span style=\"font-weight: 400;\">The communications from the information sources to a UNS broker should be as direct as possible under the technical constraints. This simplifies the implementation and operation, as well as increasing timeliness. However, plant networks should also be architected as zones, interconnected by conduits, as noted in IEC 62443, which often causes issues ensuring that the communications are properly secured. However, IEC 62443 specifies virtual conduits. These connections can travel over the various physical network segments, directly connecting 2 zones largely separated, provided they are not accessible to systems in the zones they pass through. Virtual conduits are the key to ensuring compliance with standards such as IEC 62443, maintaining real security within the network, and realizing the benefits of UNS and other data driven initiatives, simultaneously.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d8c310 e-con-full e-flex e-con e-child\" data-id=\"4d8c310\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d72cc6b elementor-widget elementor-widget-heading\" data-id=\"d72cc6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ensuring Compliance with IEC 62443\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce599e blue-med elementor-widget elementor-widget-text-editor\" data-id=\"6ce599e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"7119c24a-bef6-4cc2-848a-cd3f7a22e51d\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>UNS integrates seamlessly with cloud and industrial systems while maintaining robust security standards.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac08dde e-grid e-con-full e-con e-child\" data-id=\"ac08dde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cec020 elementor-widget elementor-widget-shortcode\" data-id=\"1cec020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf536a9 e-grid e-con-boxed e-con e-child\" data-id=\"bf536a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4bba068 e-grid e-con-full e-con e-child\" data-id=\"4bba068\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6eb5cb3 e-con-full e-flex e-con e-child\" data-id=\"6eb5cb3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-079d584 elementor-widget elementor-widget-heading\" data-id=\"079d584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Evolving OT Security Models\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65250b4 elementor-widget elementor-widget-text-editor\" data-id=\"65250b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"88ffd573-b0f3-452d-8879-b92615ddce07\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Increased focus on data integrity and confidentiality is vital for safeguarding industrial systems.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b50afc e-con-full e-grid e-con e-child\" data-id=\"8b50afc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f25e1f elementor-widget elementor-widget-heading\" data-id=\"1f25e1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Do We Need To Secure UNS?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c491a0 gray elementor-widget elementor-widget-text-editor\" data-id=\"8c491a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The OT security model places a lower inherent value on the integrity and confidentiality of data compared to the IT model, favoring safety first, and availability second. This is well understood and reasonable given the requirements and purposes of the two fields. However, in today&#8217;s cyber environment, it is important to note that integrity and confidentiality can cause safety and availability issues.<\/span><\/p><p><span style=\"font-weight: 400;\">Examples of data integrity attacks have been seen in the wild, and research is being done to understand the potential ramifications. As seen in the IT world, one can only expect the attacks to become more sophisticated, and more disruptive over time. Within the critical infrastructure subset of ICS, it is important to note that nation state actors are directly involved in the development and deployment of cyber weapons; the risks associated with these actors are very significant. Manufacturing systems not deemed critical infrastructure may also be targeted, either as collateral damage, or as a weapon of economic terrorism.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75f3aa2 e-grid e-con-full e-con e-child\" data-id=\"75f3aa2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a54ec67 elementor-widget elementor-widget-shortcode\" data-id=\"a54ec67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18dedee e-grid e-con-boxed e-con e-child\" data-id=\"18dedee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-063655e e-grid e-con-full e-con e-child\" data-id=\"063655e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-83e8793 e-con-full e-grid e-con e-child\" data-id=\"83e8793\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d81da elementor-widget elementor-widget-heading\" data-id=\"52d81da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stuxnet: The Complex Malware That Exploited Industrial Control Systems<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69c6477 gray elementor-widget elementor-widget-text-editor\" data-id=\"69c6477\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Perhaps the best known attack against industrial control systems, in this case targeting uranium enrichment, Stuxnet was a very complex malware program. It took many steps to mask itself, and to propagate, like other malware. However, the main function was to conduct a man-in-the-middle attack, intercepting the sensor signals, and preventing the safety systems from shutting down properly, leading to the destruction of the systems it infected.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">For its targets, Stuxnet contains, among other things, code for a<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">man-in-the-middle attack<\/span><\/a><span style=\"font-weight: 400;\"> that fakes industrial process control sensor signals so an infected system does not shut down due to detected abnormal behavior. Such complexity is very unusual for<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\">. The worm consists of a layered attack against three different systems:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Microsoft_Windows\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Windows operating system<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Siemens PCS 7, WinCC and STEP7 industrial software applications that run on Windows and<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One or more Siemens S7 PLCs.<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Source:\u00a0 <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Wikipedia<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d16025d e-con-full e-flex e-con e-child\" data-id=\"d16025d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35aaa31 elementor-widget elementor-widget-heading\" data-id=\"35aaa31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lessons from Stuxnet\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb1363 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"fbb1363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"7119c24a-bef6-4cc2-848a-cd3f7a22e51d\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Stuxnet\u2019s sophisticated man-in-the-middle attack highlights vulnerabilities in industrial control systems.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9893849 e-grid e-con-full e-con e-child\" data-id=\"9893849\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae9ebbb elementor-widget elementor-widget-shortcode\" data-id=\"ae9ebbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be80300 e-grid e-con-boxed e-con e-child\" data-id=\"be80300\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e88df48 e-grid e-con-full e-con e-child\" data-id=\"e88df48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-56f4ba0 e-con-full e-flex e-con e-child\" data-id=\"56f4ba0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58d187c elementor-widget elementor-widget-heading\" data-id=\"58d187c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">OT Malware in Warfare\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9fe7be elementor-widget elementor-widget-text-editor\" data-id=\"f9fe7be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"88ffd573-b0f3-452d-8879-b92615ddce07\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>FrostyGoop exemplifies the growing threat of malware targeting critical infrastructure in conflict.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96b8566 e-con-full e-grid e-con e-child\" data-id=\"96b8566\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c0b2a8 elementor-widget elementor-widget-heading\" data-id=\"2c0b2a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FrostyGoop: Russia-Linked OT Malware Disrupts Critical Infrastructure in Ukraine<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99d9e04 gray elementor-widget elementor-widget-text-editor\" data-id=\"99d9e04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">OT malware is also being used as a weapon of indirect warfare and terrorism. The Russia-Ukraine conflict has seen many examples over the last several years of attacks on power grids, and this one in particular, disrupting environmental controls during the winter.<\/span><\/p><p><span style=\"font-weight: 400;\">Industrial cybersecurity firm Dragos on Tuesday revealed a newly discovered sample of Russia-linked malware that it believes was used in a cyberattack in late January to target a heating utility in Lviv, Ukraine, disabling service to 600 buildings for around 48 hours. The attack, in which the malware altered temperature readings to trick control systems into cooling the hot water running through buildings&#8217; pipes, marks the first confirmed case in which hackers have directly sabotaged a heating utility<\/span><\/p><p><span style=\"font-weight: 400;\">The malware, which Dragos is calling FrostyGoop, represents one of less than 10 specimens of code ever discovered in the wild that&#8217;s designed to interact directly with industrial control-system software with the aim of having physical effects. It&#8217;s also the first malware ever discovered that attempts to carry out those effects by sending commands via Modbus, a commonly used and relatively insecure protocol designed for communicating with industrial technology.<\/span><\/p><p><span style=\"font-weight: 400;\">Source:\u00a0 <\/span><a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-frostygoop-malware-heating-utility\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Wired.com<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb4de30 e-grid e-con-full e-con e-child\" data-id=\"fb4de30\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0897dd elementor-widget elementor-widget-shortcode\" data-id=\"f0897dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7dc8c4f e-grid e-con-boxed e-con e-child\" data-id=\"7dc8c4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6dd3c3c e-grid e-con-full e-con e-child\" data-id=\"6dd3c3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d47d118 e-con-full e-grid e-con e-child\" data-id=\"d47d118\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0786e9 elementor-widget elementor-widget-heading\" data-id=\"f0786e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">False Data Injection: A Critical Threat to Smart Cities and Industrial Control Systems <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa06971 gray elementor-widget elementor-widget-text-editor\" data-id=\"aa06971\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A group of Turkish researchers published a paper on false data injection, considering industrial control systems and the growing movement of smart cities.<\/span><\/p><p><span style=\"font-weight: 400;\">ICS are one of the most critical components used in smart grid and smart city infrastructures. The vulnerabilities of the ICS and infrastructure architectures built on them affect the entire system. There are several attack methods that can be done through these vulnerabilities, but the FDI attack is one of the most damaging. Because with FDI (False Data Injection) attacks, it is possible to change the data in a controlled way and to change the firmware codes. <\/span><span style=\"font-weight: 400;\">When the impact of the FDI attack on the system is evaluated, it will take a long time especially to bring the system back to its current working state and great damage may occur.<\/span><span style=\"font-weight: 400;\"> In addition, with this attack, it is possible to obtain data by manipulating the data in a controlled manner. For this reason, it is critical to take countermeasures by revealing the procedures of the FDI attack.<\/span><\/p><p><span style=\"font-weight: 400;\">Source: <\/span><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404820302315\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ScienceDirect.com<\/span><\/a><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29ee3ae e-con-full e-flex e-con e-child\" data-id=\"29ee3ae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a82cfe5 elementor-widget elementor-widget-heading\" data-id=\"a82cfe5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Threats of False Data Injection\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32b4f96 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"32b4f96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"7119c24a-bef6-4cc2-848a-cd3f7a22e51d\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"4baef4f6-79b2-4981-b749-5313ed3e14c0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>FDI attacks can manipulate critical ICS data, posing severe risks to smart city infrastructures.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d24efdf e-grid e-con-full e-con e-child\" data-id=\"d24efdf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-387857f elementor-widget elementor-widget-shortcode\" data-id=\"387857f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a907663 e-grid e-con-boxed e-con e-child\" data-id=\"a907663\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2373620 e-grid e-con-full e-con e-child\" data-id=\"2373620\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-11c4d13 e-con-full e-flex e-con e-child\" data-id=\"11c4d13\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a673cd2 elementor-widget elementor-widget-heading\" data-id=\"a673cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Risks Beyond Nation States<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b752f20 elementor-widget elementor-widget-text-editor\" data-id=\"b752f20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"88ffd573-b0f3-452d-8879-b92615ddce07\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>A young hacker\u2019s tram manipulation highlights vulnerabilities in urban transport systems and oversight.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ba19e3 e-con-full e-grid e-con e-child\" data-id=\"0ba19e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9998e2 elementor-widget elementor-widget-heading\" data-id=\"a9998e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lodz, Poland Tram Hack: Another Real-World Example of Cyber Vulnerabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04b62f4 gray elementor-widget elementor-widget-text-editor\" data-id=\"04b62f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lastly, so we don&#8217;t get the impression that these sorts of risks are only coming from nation state actors, theoretically or actually. In 2008 a 14 year old Polish boy built a device that allowed him to &#8220;play&#8221; with the city trams like a model train set.<\/p><p>&#8220;He treated it like any other schoolboy might treat a giant train set, but it was lucky nobody was killed. Four trams were derailed, and others had to make emergency stops that left passengers hurt. He clearly did not think about the consequences of his actions,&#8221; Micor added.<\/p><p>Source: <a href=\"https:\/\/www.theregister.com\/2008\/01\/11\/tram_hack\/\" target=\"_blank\" rel=\"noopener\">theRegi<\/a><a href=\"https:\/\/www.theregister.com\/2008\/01\/11\/tram_hack\/\" target=\"_blank\" rel=\"noopener\">ster.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e0ec37 e-grid e-con-full e-con e-child\" data-id=\"3e0ec37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e3bc76 elementor-widget elementor-widget-shortcode\" data-id=\"0e3bc76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-101314e e-grid e-con-boxed e-con e-child\" data-id=\"101314e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6be4fc2 e-grid e-con-full e-con e-child\" data-id=\"6be4fc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5b8b744 e-con-full e-grid e-con e-child\" data-id=\"5b8b744\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef4485 elementor-widget elementor-widget-heading\" data-id=\"1ef4485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securing Connected Industrial Systems: The Critical Role of Risk Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-930bc7a gray elementor-widget elementor-widget-text-editor\" data-id=\"930bc7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As industrial systems become more and more connected, these risks will continue to increase. The potential ramifications of all cyberattacks must be taken into account in proper risk management programs. While the priority on safety is paramount, one must understand the threat landscape of how safety may be compromised, which may be in ways that are not commonly considered in the OT space.<\/span><\/p><p><span style=\"font-weight: 400;\">Industrial systems continue to evolve into more data driven architectures.I It is critical that we learn from the mistakes of the IT events that have happened over the last decades; true security by design should be implemented in every step. As UNS is a major step forward in the collection and dissemination of data across entire enterprises, special care must be taken to ensure the security of the system as a whole.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b22efa7 e-con-full e-flex e-con e-child\" data-id=\"b22efa7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b488432 elementor-widget elementor-widget-heading\" data-id=\"b488432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Navigating Cyber Risks in Connected Systems\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f80c25f blue-med elementor-widget elementor-widget-text-editor\" data-id=\"f80c25f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"7119c24a-bef6-4cc2-848a-cd3f7a22e51d\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"2f8b95c2-d455-4b90-9aab-fb26033134c1\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>As industrial systems evolve, robust risk management and security by design are essential.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c77912b e-grid e-con-full e-con e-child\" data-id=\"c77912b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3de790a elementor-widget elementor-widget-shortcode\" data-id=\"3de790a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75854e8 e-grid e-con-boxed e-con e-child\" data-id=\"75854e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4c7da5e e-grid e-con-full e-con e-child\" data-id=\"4c7da5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2d76a42 e-con-full e-flex e-con e-child\" data-id=\"2d76a42\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8cdacdd elementor-widget elementor-widget-heading\" data-id=\"8cdacdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ziti: Simplifying Secure Connectivity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96c6ce6 elementor-widget elementor-widget-text-editor\" data-id=\"96c6ce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"88ffd573-b0f3-452d-8879-b92615ddce07\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>NetFoundry&#8217;s Ziti offers a lightweight, open-source solution for seamless industrial and enterprise networking.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93d67b1 e-con-full e-grid e-con e-child\" data-id=\"93d67b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-133a4e2 elementor-widget elementor-widget-heading\" data-id=\"133a4e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How NetFoundry\u2019s Ziti Platform Can Enable UNS and Beyond<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eddeaa8 gray elementor-widget elementor-widget-text-editor\" data-id=\"eddeaa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Ziti, the core architecture and technology of NetFoundry, is a software defined and implemented secure network. It operates at the communication layer, offering security and simplicity, while <\/span><a href=\"https:\/\/netfoundry.io\/netfoundry-cloud-naas\/what-is-overlay-networking\/\"><span style=\"font-weight: 400;\">maintaining the features and functionality of a production class network<\/span><\/a><span style=\"font-weight: 400;\">. Options are available for embedding the functions directly into software via software development kits (SDKs) in a multitude of languages, and the C-SDK is built to be lightweight, suitable for resource limited environments. The software is open source, and is fully available for integration into products and solutions. This allows vendors and operators to utilize the software as a primary communication method, or an available option, without licensing costs.<\/span><\/p><p><span style=\"font-weight: 400;\">The challenge of networking across both industrial and enterprise systems is real. The security requirements of both can be very different, and implementing common systems is difficult. However, Ziti provides the opportunity to deploy UNS data senders and brokers wherever needed without complexity. Ziti endpoints use outbound only connectivity, from an underly perspective, even when used to host services that others initiate towards. The configuration of the identity provides the Network Controller address, and this allows the endpoint to attach to the network instance. Once authenticated and authorized, the endpoint receives additional configuration information, and connects to Edge Routers as appropriate.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5615b13 e-grid e-con-full e-con e-child\" data-id=\"5615b13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3813029 elementor-widget elementor-widget-shortcode\" data-id=\"3813029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8836210 e-grid e-con-boxed e-con e-child\" data-id=\"8836210\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-942b670 e-grid e-con-full e-con e-child\" data-id=\"942b670\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ab1a356 e-con-full e-grid e-con e-child\" data-id=\"ab1a356\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-707dd89 elementor-widget elementor-widget-heading\" data-id=\"707dd89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dynamic, Policy-Driven Connectivity: Simplifying Network Operations with Ziti for UNS and Beyond<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96c6049 gray elementor-widget elementor-widget-text-editor\" data-id=\"96c6049\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">From an underlay networking perspective, this allows the various firewalls, access control lists, and other systems to simply block all inbound traffic to the device, allowing outbound only. This simplifies network configurations, because the system as a whole does not have to record and allow the various connections, forcing rule updates per device additional or change or the resulting audits and other ongoing work associated with network operations. Instead, the Ziti network instance allows or disallows connectivity by policy, and is dynamic. A policy change to allow or disallow connections between identities and services is applied within seconds, either to allow, or to disallow and break current connections. To view or audit the connectivity, a central location across the entire enterprise can be used, with built in tools.<\/span><\/p><p><span style=\"font-weight: 400;\">The same connectivity can be applied to systems within the enterprise network that need to connect to the UNS to publish or extract data. Prebuilt software is available for all major operating systems, or the SDKs can be used to embed. Other deployment models to utilize Edge Routers or tunnelers as gateways are also available, and all models can coexist, depending on need.<\/span><\/p><p><span style=\"font-weight: 400;\">Once a Ziti network exists, it is a resource to be used for connectivity, UNS is just one use case. Remote access and other uses are easily deployed using the same models, and the <\/span><span style=\"font-weight: 400;\">availability of APIs<\/span><span style=\"font-weight: 400;\"> to integrate with existing software can provide flexibility far beyond legacy networks, <\/span><a href=\"https:\/\/blog.openziti.io\/business-rule-driven-just-in-time-network-access\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">enabling models like just-in-time access (JIT)<\/span><\/a><span style=\"font-weight: 400;\"> integrated with existing processes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62ac610 e-con-full e-flex e-con e-child\" data-id=\"62ac610\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba4ab69 elementor-widget elementor-widget-heading\" data-id=\"ba4ab69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dynamic Secure Networking with Ziti<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca4ff82 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"ca4ff82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"7119c24a-bef6-4cc2-848a-cd3f7a22e51d\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"4baef4f6-79b2-4981-b749-5313ed3e14c0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Ziti streamlines outbound-only connectivity, enhancing security and simplifying network management across systems<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fcd8f1 e-grid e-con-full e-con e-child\" data-id=\"1fcd8f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64f2465 elementor-widget elementor-widget-shortcode\" data-id=\"64f2465\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecc1938 e-grid e-con-boxed e-con e-child\" data-id=\"ecc1938\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e283ca8 e-grid e-con-full e-con e-child\" data-id=\"e283ca8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-77acaaf e-con-full e-flex e-con e-child\" data-id=\"77acaaf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f8af33 elementor-widget elementor-widget-heading\" data-id=\"0f8af33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ziti: Simplifying Secure Connectivity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe84a30 elementor-widget elementor-widget-text-editor\" data-id=\"fe84a30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"88ffd573-b0f3-452d-8879-b92615ddce07\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>NetFoundry&#8217;s Ziti offers a lightweight, open-source solution for seamless industrial and enterprise networking.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e20c3d e-con-full e-grid e-con e-child\" data-id=\"1e20c3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ffa44d elementor-widget elementor-widget-heading\" data-id=\"8ffa44d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementing UNS in Industry 4.0: Simplifying Secure Data Integration with Ziti\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-776d0bc gray elementor-widget elementor-widget-text-editor\" data-id=\"776d0bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">UNS is an evolution, tied to the Industry 4.0 movement that enables businesses with manufacturing and other industrial processes to collect and distribute data to more effectively monitor and manage the state of the business, increasing efficiency, reducing costs, and enabling higher profitability As an information system, UNS has some potential to be difficult to fully implement in OT environments, due to more stringent requirements to meet safety and availability needs. Ziti enables organizations to implement UNS simply and efficiently, regardless of the network configuration or node types, and to be secure in the design, protecting the business, and meeting the requirements of relevant standards, such as ANSI_IEC 62443.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b766d57 e-grid e-con-full e-con e-child\" data-id=\"b766d57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39970fe elementor-widget elementor-widget-shortcode\" data-id=\"39970fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4d1e94 e-grid e-con-boxed e-con e-child\" data-id=\"d4d1e94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec6c6b elementor-widget__width-inherit elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"9ec6c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/top-5-u-s-milgov-contractor-private-5g-case-study\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Previous<\/span><span class=\"post-navigation__prev--title\">Top 5 U.S. MilGov Contractor Private 5G Case Study<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/the-lvt-and-netfoundry-partnership\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Next<\/span><span class=\"post-navigation__next--title\">LiveView Technologies Case Study<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/main>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NetFoundry White Papers What Is A Unified Namespace Unified Namespace, or UNS is a concept born primarily of the ANSI_ISA-95 standard\u2019s Equipment Hierarchy Model and extended well beyond it to encompass the entire enterprise. The purpose of UNS is to provide a unified approach to the collection and distribution of the current state of industrial [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":41164,"menu_order":0,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"feature":[],"resource-tags":[824,732,724,823,822,821,708],"resource-categories":[586],"class_list":["post-41166","resources","type-resources","status-publish","format-standard","has-post-thumbnail","hentry","resource-tags-industrial-networking","resource-tags-netfoundry-cloud","resource-tags-ot","resource-tags-overlay-networking","resource-tags-unified-namespace","resource-tags-uns","resource-tags-ziti-platform","resource-categories-white-papers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Unified Namespace and Secure Connectivity: Transforming Industrial Data Management<\/title>\n<meta name=\"description\" content=\"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management\" \/>\n<meta property=\"og:description\" content=\"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-14T13:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/\",\"name\":\"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg\",\"datePublished\":\"2024-09-28T19:57:09+00:00\",\"dateModified\":\"2024-10-14T13:03:21+00:00\",\"description\":\"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | Unified Namespace and Secure Connectivity: Transforming Industrial Data Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management","description":"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/","og_locale":"en_US","og_type":"article","og_title":"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management","og_description":"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.","og_url":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_modified_time":"2024-10-14T13:03:21+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@netfoundry","twitter_misc":{"Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/","url":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/","name":"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg","datePublished":"2024-09-28T19:57:09+00:00","dateModified":"2024-10-14T13:03:21+00:00","description":"Learn how UNS, powered by Netfoundry\u2019s Ziti platform, drives efficiency in Industry 4.0 by securely integrating data across industrial processes while meeting stringent OT safety standards.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management.jpg","width":1536,"height":804,"caption":"NetFoundry | Unified Namespace and Secure Connectivity: Transforming Industrial Data Management"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/resources\/unified-namespace-and-secure-connectivity-transforming-industrial-data-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/netfoundry.io\/resources\/"},{"@type":"ListItem","position":3,"name":"Unified Namespace and Secure Connectivity: Transforming Industrial Data Management"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41166\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/41164"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=41166"}],"wp:term":[{"taxonomy":"feature","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/feature?post=41166"},{"taxonomy":"resource-tags","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-tags?post=41166"},{"taxonomy":"resource-categories","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-categories?post=41166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}