We use cookies, similar technologies and tracking services

This website uses cookies, similar technologies and tracking services (hereinafter referred to as “Cookies”). We need your consent for Cookies, which not only serve to technically display our website, but also to enable the best possible use of our website and to improve it based on your user behavior, or to present content and marketing aligned with your interests. For these purposes, we cooperate with third-party providers (e.g. Salesforce, LinkedIn, Google, Microsoft, Piwik PRO). Through these partners you can also receive advertisements on other websites.
If you consent, you also accept certain subsequent processing of your personal data (e.g. storage of your IP address in profiles) and that our partners may transfer your data to the United States and, if applicable, to further countries. Such transfer involves the risk that authorities may access the data and that your rights may not be enforceable. Please select which Cookies we may use under ”Settings”. More information, particularly about your rights, e.g. to withdraw consent, is available in our Privacy Policy .

Settings

Only technically necessary Cookies

Accept everything

Below, you can activate/deactivate the individual technologies that are used on this website.

Accept All

Essential

These Cookies make a website usable by providing basic functions such as page navigation, language settings, Cookie preferences and access to protected areas of the website. Cookies in this category additionally ensure that the website complies with the applicable legal requirements and security standards. Owing to the essential nature of these Cookies, you cannot prevent their use on our website. Details about these Cookies are available under 'More information'.

Functionality and personalization

These Cookies collect information about your habits when using our web pages and help us to enhance your user experience by tailoring the functions and attractiveness of our web pages based on your previous visits, location and browser settings. They also enable access to integrated third-party tools on our website (e.g., Microsoft Azure for single sign-on authentication). This can involve transferring your data to the United States (for information on the risks involved read Clause 1.5 of our Privacy Policy). If you refuse these Cookies, you might not be able to access the full functionality of the website. Details about the tools we use are available under 'More information'.

Analysis

These Cookies are used to compile basic usage and user statistics based on how our web pages are used (e.g. via Google Tag Manager, Piwik PRO). If you accept these Cookies, you simultaneously consent to your data being processed and transmitted to the United States by services such as Salesforce Pardot (for information on the risks involved read Clause 1.5 of our Privacy Policy). Details about the tools we use are available under 'More information'.

Marketing and social media

These Cookies help third-party sources collect information about how you share content from our website on social media or provide analytical data about your user behavior when you move between social media platforms or between our social media campaigns and our web pages (e.g., LinkedIn Insights). Marketing Cookies from third-party sources also help us measure the effectiveness of our advertising on other websites (e.g. Google Ads, Microsoft Advertising). We use these Cookies to optimize how we deliver our content to you. The third-party sources and social media platforms we use can transfer your data to the United States (for information on the risks involved read Clause 1.5 of our Privacy Policy). If you accept these Cookies, you simultaneously consent to your data being transferred and processed as described above. Details about the tools we use and our social media presence are available under 'More information'.

More information

Save Settings

  • Shop floor digital

The digital future must be secure: MOM from iTAC provides security at all levels

The manufacturing industry needs innovative and secure software solutions

Montabaur, 20 June 2024 – Increasing digitalization and networking are creating more gateways for cyber threats. Protecting sensitive production data and ensuring business continuity are therefore important for companies. And the security starts with the software in use. A holistic approach to security – from architecture and software design to implementation, testing and deployment – is crucial here. The holistic production management system (MOM) from iTAC Software AG is designed to do exactly that.

"In an increasingly networked world, in which the control and optimization of production processes must be raised to a new level, new types of software solutions are needed. This is where modern MOM systems come in, representing an evolutionary development of MES," explains Volker Burch, Vice President R&D at iTAC Software AG.

MOM systems with SCADA and APS functionalities, such as those offered by iTAC, the parent company Dürr and the subsidiary DUALIS in combination, offer various advantages over traditional MES. The switch from monolithic systems to microservice-oriented architectures enables greater flexibility, scalability and agility in the production environment.

Thanks to the modular structure of the MOM, companies can select specific functions from the standard portfolio in a process-oriented manner, configure them as required and – if necessary – adapt them in order to optimally integrate the processes and achieve the desired benefits.

From MES to MOM

"The switch from MES to MOM brings significant benefits for production management and the supply chain. In times of increasing threats to companies from criminal hackers and institutions, future-proof MOM systems must now also be developed, integrated and operated with a strong focus on IT security. By introducing security measures in all aspects, companies can achieve a secure, robust and trustworthy manufacturing IT landscape that meets the requirements of a modern factory," says Volker Burch.

iTAC ensures that security aspects are integrated into the process right from the start. From development to implementation and operation of the iTAC.MOM.Suite, clear guidelines and state of the art standards are followed. A holistic approach – from architecture and software design to implementation, testing and deployment – takes the relevant security aspects into account at every stage and is supported by established, audited processes and tools. While there used to be common security vulnerabilities in the development of software, these are now largely eliminated thanks to the support of tools that provide early warning of potential threat scenarios.

Laws and guidelines provide a new framework

There are also various efforts and measures on the part of legislators to strengthen the resilience of organizations to cyber attacks and to minimize the impact of security incidents. The Cyber Resilience Act is currently gaining in importance in this context.

Volker Burch explains: "The Cyber Resilience Act is a clear call to action that requires companies to strengthen their security measures and proactively address cyber threats. By implementing cybersecurity best practices, organizations can not only protect their data and operations, but also protect their investment and reputation by building trust with customers. Otherwise, security incidents cause potential financial losses and reputational damage. In addition, the Cyber Resilience Act offers companies the opportunity to differentiate themselves from competitors by demonstrating that they are actively addressing cybersecurity challenges and continuously improving their systems and processes."

Compliance with guidelines and laws is also of global relevance, as Volker Burch points out: "By investing in secure systems such as our MOM, companies can not only protect their own interests, but also help to strengthen the overall security of the digital industry."