Thursday, 24 November 2022
Subscription centricity: 5 tips for designing diverse, recurring revenue models
Sunday, 8 August 2021
3 ways the auto industry benefits from simplified supplier collaboration
Managing a diverse and agile supplier network is now a top priority in the auto industry and essential to remain competitive. Whether shifting to produce electric vehicles, dealing with the semiconductor shortage or mitigating everyday disruptions, the automotive OEM and aftermarket supply chains, live and die by their supplier network. The need for innovation and modernization in automotive business networks is crucial to remove friction, enable visibility and build resiliency for whatever comes next.
How will you ensure your organization is agile, resilient and adaptable enough to meet the challenges it faces? To paraphrase Charles Darwin, “It’s not the strongest of the species that survives, it’s the one most adaptable to change.” We can see this principle at play in the auto industry today: Tesla, in just a few short years, has become a market-leader in the plug-in and battery electric car sector. Contrast that with market-leading automakers that have experienced sales declines of 20 to 30% in North America over the course of the pandemic.
Without a robust B2B network or simplified supplier relationships you can’t pivot. You can’t adapt quickly to trends and changes. You can’t readily tap into new suppliers to capitalize on renewed demand. This is especially true in the automotive industry, where hundreds of suppliers and partners are fundamental to a company’s success.To ensure business continuity during times of extreme change and help position your organization for long-term growth, here are three ways you can increase the resilience of your supply chain and B2B networks:
1. Automate supplier onboarding: One major reason companies can’t adapt adequately enough is because they can’t find and integrate the right suppliers in a timely manner. Ensure that suppliers and partners can be well-vetted, integrated, and quickly onboarded to your network. Solutions that automate vetting and onboarding can get suppliers online up to 75% faster. Those weeks and months saved, across hundreds of relationships, can be used for other innovative, value-driven work.
2. Increase flexibility and efficiency of B2B collaboration: Auto manufacturers manage an increasingly complex, multi-enterprise ecosystem, but it’s typically overwhelmed by disparate systems and disconnected processes. To compete in today’s hyper-connected global economy, you need to digitize and automate connectivity as much as technology will permit. In the process, you’ll streamline and simplify complex processes. Having real-time, digitally-connected relationships with the suppliers that matter most to your business is essential to remain competitive. Modern business networks, whether on cloud, hybrid-cloud or even on premises, can provide those fast, real-time, digital connections and communications required to optimize the value you get out of your supplier base. They can help you break down walls and silos between organizations, streamline processes, and enable the bi-directional flow of data and information. Clear and quick communication and data exchange are the lifeblood of collaborative supplier relationships.
3. Modernize technology: Most automakers have a patchwork of supply chain and B2B network technologies that were never designed for today’s dynamic environment. That’s why focusing on modernizing your B2B network offers so much upside, like gaining the scalability and agility to keep pace with changing business and technology needs.
When you modernize your B2B platform by moving to a hybrid cloud or managed service, you can begin to transition from homegrown or acquired processes and applications that cause inefficiencies and errors. Best-in-class B2B networks can automate transactions, provide real-time data visibility and capitalize on AI to provide you with intelligent alerts on exceptions and disruptions, and more. Digital B2B networks are also proven to decrease document management tasks by 85%, prevent 80% or more of current errors, and cut unplanned downtime by 99%.
Source: ibm.com
Thursday, 22 July 2021
Implement a zero trust strategy for your file transfers
The recent Kaseya ransomware attack is yet another reminder of the voracity of the war cybercriminals are waging on the business world. In 2020, scan-and-exploit became the top initial attack vector for surveyed organizations, surpassing phishing, according to the 2021 IBM X-Force Threat Intelligence Index. The report goes on to note that manufacturing was the second-most attacked industry in 2020 for respondents, up from eighth place the year prior, and second only to financial services.
What’s behind these attacks?
Companies have invested a great deal in building castle-and-moat protections against external threats, focusing on protecting the DMZ or perimeter zone. In a world of known threats and less sophisticated techniques, this protection model worked reasonably well. But times have changed.
Cybercriminals can be well resourced and tenacious and even backed by nation-states. They can leverage ever more sophisticated tools, such as Ransomware-as-a-Service, and can be incentivized by cryptocurrencies with their strong liquidity and poor traceability. As a result, they are well positioned in the arms race against traditional perimeter defenses. Clearly, it is time to consider a zero trust approach to help protect your most valuable resource—your data.
The rise of zero trust
The problem with the castle-and-moat model is the primary focus on external defenses. Once inside, cybercriminals can generally move freely around without much impediment and wreak havoc. This has led to a broadening of the security perspective to encompass internal security, with what is termed the zero trust model.
The Biden administration in the United States, recently issued an Executive Order calling for advancement towards a zero trust model within the federal government and among federal contractors. Subsequently, in response to multiple high-profile ransomware attacks, the White House also issued a memo to business executives urging them to protect against the threat of the ransomware. Such a model is an “evolving set” of concepts that move beyond “defenses from static, network-based perimeters” according to the National Institute of Standard and Technology (NIST).
When a cybercriminal or organization has breached a perimeter and has access to your secure environment, typically they will start a stealth scan to build a map of your network. They will enumerate the server they are on for all its credentials and then will try those credentials on your other servers to travel laterally. Most breaches move from computer to computer over standard protocols such as SSH, FTP, SFTP, HTTP, and HTTPS. This means you need to have a strategy for restricting the spread or movement within your organization.
Zero trust to protect your file transfers
At IBM, our Sterling Secure File Transfer (SFT) solution is designed to align with a zero trust approach and harden servers to help reduce the possibility for ransomware or malware to travel laterally. The aim is to protect the inside of the castle – or inside the DMZ – to help safeguard internal intellectual property and assets. A zero trust approach requires securing and regulating movement between internal computers and servers and we begin by removing untrusted protocols.
Our SFT solution is designed to include IBM Sterling Connect:Direct which uses a security-hardened protocol. When malware reaches out internally, it will not know how to ‘talk’ to the protocol. It can also check the IP address from the server that has requested access, and if that IP address is not on the internal list of trusted servers, which can be consistently updated, the receiving server automatically drops the session.In addition to these two internal security checkpoints, Connect:Direct can have additional checkpoints to further help prevent the spread of malware to another server. The malware also needs the correct credentials, which can be increased for additional protection of high-value servers, and only files with a specified name may be transferred.
Each server that uses Connect:Direct becomes a checkpoint – and choke point – for malware. This zero trust approach in Connect:Direct hardens infrastructure and includes capabilities for zero trust practices for communications that can help mitigate risks of traditional protocols using FTP, SFTP and SSH. SFT can also encrypt data at rest and in transit, and provides multifactor authentication helping implement a zero trust strategy for your file transfers.
So, if you have a traditional castle-and-moat security model, I urge you to consider implementing or expanding your zero trust strategy to help protect what is most valuable inside of your organization. You can start small and add more protections over time. The key is to begin now because the war will continue to escalate.
Source: ibm.com