Identification and Access Management – I.A.M. from PILZ

MC Identificaton and Access Management 1 400x275

November 7, 2022

 

How do you master the subjects of employee protection, liability protection, productivity and data protection? How do you increase your quality and simultaneously prevent tampering on your machines? How do you protect your data and employees in equal measure?

With “Identification and Access Management”, I.A.M. for short, we are offering a wide-ranging package of products and software, as well as tailor-made solutions for your daily access management challenges. We will help you organise your machine access and employee permissions. From simple authentication to complex access management, from functionally safe operating mode selection to electronic maintenance safeguarding. And also, of course, when protecting your valuable data from unauthorised access and from hacker attacks on your plant. With Pilz you’ll find the right solution and get safety and security in one system.

 
Why I.A.M. is relevant for you too – PILZ’s four core values
 
Employee protection

Work must be organised in such a way that hazards to physical and mental health are avoided. It’s something that should be a matter of course when operating industrial plant and machinery, but all too often is not given sufficient attention in practice, whether consciously or unconsciously.

For the best possible protection of your employees, you can have Pilz carry out a hazard assessment to check the hazard levels on your machines and examine how access must be secured. In addition to appropriate access permissions on safety gates and suitably qualified personnel, the use of operating modes is another adequate measure. Operating mode selection can be controlled with functional safety using PITmode products. This provides a technical guarantee that each employee can only carry out the work for which they are qualified, thus offering maximum protection against hazards and accidents.

Liability protection

If an industrial accident occurs, the immediate question is whether responsible parties can be made liable. For this reason, especially at company management level and among production and maintenance managers, it is essential that appropriate measures are taken, and that the effectiveness of these measures is checked on a regular basis. If this is neglected, employers and responsible parties can be held accountable for their actions, or for their failure to act!

For example, potential measures are to select and train staff based on their tasks, and to provide them with the appropriate tools. In addition to organisational measures, you can also use technical solutions, such as access management with PITreader, for example. That way it is always possible to assign traceable, individual and if necessary temporary permissions for specific machines or processes.

Maintaining productivity

The necessary machinery safety measures must not be at the expense of your plants’ productivity. Machine downtimes – in the worst case with injured persons or damage to the machine – often happen as a result of tampering, incorrect operation or a lack of (access) controls. With clear responsibilities, relevant permissions and recording of user actions, you can prevent errors and provide optimum traceability. With its access management functions, PITreader offers an ideal solution for safety, security and maintaining the productivity of your valuable plant.

Data protection

Due to the constant changes in the standards situation, the focus is increasingly on data protection and network security. Comprehensive safety is no longer possible without also considering aspects of security. A holistic safety concept is required. In future, the Machinery Regulation, which comes into force in the EU in 2025, will take this into account.

However, your data, your know-how and your operations need protecting from unauthorised access today. Clever products such as the industrial firewall SecurityBridge, or even the switchable USB interface PIToe USB, offer security against “external” threats due to hacker attacks as well as threats “from within”, whether due to carelessness or intent. Use PITreader as an additional factor, so that all data connections can only be activated temporarily on site, as a result of deliberate operator action.

 

For further information, click here 

PILZ Logo 300x150

 

 

 

 

Related Articles


Latest Articles

  • The Fundamentals of Machine Vision in Automation: What You Need to Know

    September 18, 2023 Machine vision has a place in many industries, including food & beverage, automotive, semiconductor, life sciences, and more. In this article, Ryan Marti, Product Manager – Industrial Cameras at Omron Automation walks us through the fundamentals of machine vision in automated processes and holds a lens to look at Omron’s products and… Read More…

  • What Is the Meaning of the IP Ratings for Power Supplies? PULS Explains

    September 13, 2023 The IP rating indicates to what extent an electrical device is protected against the penetration of foreign objects and moisture. In this blog post, you can find out which IP codes there are, what the differences are between them and what you need to pay attention to when choosing a power supply…. Read More…


Featured Article

5 Common Mistakes to Avoid When Implementing Autonomous Mobile Robots (AMRs) in Your Facility

5 Common Mistakes to Avoid When Implementing Autonomous Mobile Robots (AMRs) in Your Facility

As technology advances, autonomous mobile robots (AMRs) have emerged as valuable tools for improving efficiency and productivity in various industries. From warehouses to manufacturing facilities, these intelligent machines are revolutionizing the way we handle tasks and streamline operations.

However, deploying AMRs successfully requires careful planning and consideration. In this blog post, Omron explores some common mistakes that people make when implementing autonomous mobile robots in their facilities and provide insights on how to avoid them.

Read More


Products