"In an increasingly networked world, in which the control and optimization of production processes must be raised to a new level, new types of software solutions are needed. This is where modern MOM systems come in, representing an evolutionary development of MES," explains Volker Burch, Vice President R&D at iTAC Software AG.
MOM systems with SCADA and APS functionalities, such as those offered by iTAC, the parent company Dürr and the subsidiary DUALIS in combination, offer various advantages over traditional MES. The switch from monolithic systems to microservice-oriented architectures enables greater flexibility, scalability and agility in the production environment.
Thanks to the modular structure of the MOM, companies can select specific functions from the standard portfolio in a process-oriented manner, configure them as required and – if necessary – adapt them in order to optimally integrate the processes and achieve the desired benefits.
From MES to MOM
"The switch from MES to MOM brings significant benefits for production management and the supply chain. In times of increasing threats to companies from criminal hackers and institutions, future-proof MOM systems must now also be developed, integrated and operated with a strong focus on IT security. By introducing security measures in all aspects, companies can achieve a secure, robust and trustworthy manufacturing IT landscape that meets the requirements of a modern factory," says Volker Burch.
iTAC ensures that security aspects are integrated into the process right from the start. From development to implementation and operation of the iTAC.MOM.Suite, clear guidelines and state of the art standards are followed. A holistic approach – from architecture and software design to implementation, testing and deployment – takes the relevant security aspects into account at every stage and is supported by established, audited processes and tools. While there used to be common security vulnerabilities in the development of software, these are now largely eliminated thanks to the support of tools that provide early warning of potential threat scenarios.
Laws and guidelines provide a new framework
There are also various efforts and measures on the part of legislators to strengthen the resilience of organizations to cyber attacks and to minimize the impact of security incidents. The Cyber Resilience Act is currently gaining in importance in this context.
Volker Burch explains: "The Cyber Resilience Act is a clear call to action that requires companies to strengthen their security measures and proactively address cyber threats. By implementing cybersecurity best practices, organizations can not only protect their data and operations, but also protect their investment and reputation by building trust with customers. Otherwise, security incidents cause potential financial losses and reputational damage. In addition, the Cyber Resilience Act offers companies the opportunity to differentiate themselves from competitors by demonstrating that they are actively addressing cybersecurity challenges and continuously improving their systems and processes."
Compliance with guidelines and laws is also of global relevance, as Volker Burch points out: "By investing in secure systems such as our MOM, companies can not only protect their own interests, but also help to strengthen the overall security of the digital industry."