[ { "uid": "link_contact", "linkName": "Contact", "url": "##wago-support-contact-anchor", "target": "_self", "classAttributes": "phone" } ]
On this page:
[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]

Customer application
Highest Level of Security for Computer Centers Thanks to Cloud-Based Power Data Analysis

If hackers or a technical malfunction paralyze the servers of a corporation, the failures can lead to millions in damage. One company, Correct Power Institute, has developed a method for monitoring computer centers that quickly traces faults in the power supply and thus ensures high availability of the IT systems. The approach: Controllers from WAGO detect all electrical current and environmental data and use the cloud for analysis. The hardened Linux® operating system in the controllers and Correct Power’s sophisticated security architecture ensure the highest level of data security.

Cybercrime is a Security Risk

Imagine an automotive manufacturer in Stuttgart: In the middle of the morning shift, production suddenly stops. Belts stop; the swift movements of the parts robots freeze; the touch screens of the production engineers go dark. Later, it emerges that cyber criminals have attacked the manufacturer’s computing center and cut the power supply to the servers. In places where Industry 4.0 has been implemented, where the most important processes are controlled via IT, this is an expensive incident: It is estimated that the company would have to absorb 20 million euros in losses due to this production stoppage.

This example may be imaginary, but it is also quite real, as almost all of the large-sized companies, banks and insurance groups are outsourcing their IT to computing centers. These constantly process, analyze and store data, in particular in the cloud, which provides enormous additional IT capacities. Yet therein lies the rub: Server farms can be easily attacked via the Internet if their IT security is not robust. Hackers increasingly exploit these weak points to infiltrate viruses into code, to steal data or to cripple the power supply.

digitalisierung_referenz_antsorg_interviewportait_bernd-steinkuehler_x4_2000x2000.jpg
The Achilles’ Heel: Server Power Supplies

Bernd Steinkühler

Correct Power Institute

Faulty IT Curtails Competitiveness

“Power supplies are the Achilles’ heel of servers,” explains Bernd Steinkühler, CEO at the Correct Power Institute GmbH. This company from Bochum specializes in constructing and monitoring server farms. The problem: Even though electrical supplies are regulated by standards and requirements, these are often not fully implemented. “There are many rules and regulations, and it is easy for operators to lose track. Monitoring is often lacking, and problems are not detected early enough,” states Steinkühler. This can have fatal results for a company. If the IT system does not work around the clock, then production and competitiveness are negatively impacted.

Analysis in the Cloud using Azure

Correct Power can provide remedies: The company has developed a monitoring concept for server farms that targets maximum power availability. “To meet the demands for availability and security in modern computing centers, we have to examine the electricity more explicitly in order to detect and evaluate the residual currents in greater detail. We test the current extensively,” explains Marcel Steinkühler, who is in charge of Sales and Marketing at Correct Power. Controllers from WAGO play an essential role. They collect electrical and environmental data from up to 15,000 data points per server farm and send them for analysis and archiving to Microsoft’s Azure platform, which is in turn managed by the telecom subsidiary T-Systems. “This provides us with concentrated big data intelligence. In addition, Azure offers a high level of data monitoring, because T-Systems functions as a German trustee to control access,” according to CEO Bernd Steinkühler.

digitalisierung_referenz_ueberwachung_rechenzentrum_cybersecurity_istock_599903534_2000x1500.jpg

Cloud-Based Control of Environmental Variables

Differential current values, which are detected in the server racks at the computing center, form the basis for Correct Power’s analysis. Differential current is, per definition, the vector sum of the currents of all active conductors at a specific point in an electrical system. Because the currents flowing in and out of the racks have to be balanced, this should be equal to zero. “When deviations arise, there is probably a fault, and our system sounds the alarm,” explains Steinkühler. The company also monitors environmental values like humidity, temperature and pressure. If it becomes too hot in the server rooms, the sensitive servers operate at reduced output and increased power consumption. In such cases, the temperature is automatically regulated by the climate control systems, and the cloud sends a warning message.

Security Updates Entail Immense Effort

It all sounds easy; however, it is based on a sophisticated system. The specialists at Correct Power considered data security extensively in their design. “Many standard market controllers simply do not offer what we need in this regard,” states Steinkühler. These controllers are based on Windows and thus require regular security updates. “This is associated with enormous expense and does not fit with our high security requirements.” Therefore, Correct Power selected the PFC200 Linux® Controller from WAGO. “Security by Design” – IT security integrated from the outset in the form of layer-based security architecture – ensures that data thieves will have serious problems with these controllers. “We are enamored of the hardened Linux® operating system,” says Steinkühler.

The PFC200 Controller:

  • Programming according to IEC 61131-3

  • Can be combined with high-level languages

  • PLC and IT functions all in one device

  • High cybersecurity standards (SSL, SSH, OpenVPN and firewall)

Core of the Security Chain

The Bochum company’s designers can no longer even imagine their concept without the PFC200. It automatically transfers selected values at defined intervals to the firewall of Palo Alto Network, a security firm. Communication is secured by an encrypted VPN connection using the proven MQTT protocol.

Palo Alto evaluates the information, detects intruders and repels attacks against the IT system. They then pass the “clean” values via the Internet to Azure for further cloud processing. “Through this intermediate step, our monitoring solution has become the Fort Knox for data,” says Steinkühler.

digitalisierung_referenz_antsorg_interviewportait_marcel-steinkuehler_x1_2000x1500.jpg

Access Current and Historical Data from Any Location

The so-called Asset Management Cloud, developed by the WAGO subsidiary M&M, receives the data through Azure. A Web portal serves as the user interface, which allows adjustments to be made, for example, regarding which information is eventually stored in the cloud or which measured values will trigger alarms. The information can be clearly displayed in the forms of tables and diagrams on a dashboard and in the data warehousing database supported by Correct Power. “The good thing about the solution is that we have access to current and historical data, regardless of location,” explains Steinkühler.

Strong Interest from Industries, Banks and Insurance Firms

Industrial firms, banks and insurance companies have shown interest in Correct Power’s monitoring systems. These have already been implemented by IT specialists in twenty server farms across Europe, Asia and Australia and are planned in ten others. As their next project, Correct Power is planning to use Azure for failure prediction and to develop new operating strategies for increasing the availability of the servers. “Problems often result from unfavorable correlations. We want use artificial intelligence, so-called machine learning, to detect and prevent errors,” explains Steinkühler.

Experts see important topics for the future in machine learning and neural networks. With them it will be possible to use energy and process and for predictive maintenance, for example. Production systems will no longer be repaired when they fail, but rather before they do. This will prevent long idle times and the associated costs. WAGO can also facilitate a step in the direction of Industry 4.0, because their controllers can be used as central data managers for analog and digital information with secure links to the cloud.

Interviews with WAGO

Expert Opinions on Cybersecurity

Interview

Cybersecurity in the Shipbuilding Industry

Shipbuilders, system integrators and shipping companies are enthusiastic about the new opportunities that Maritime 4.0 offers. Professor Karl-Heinz Niemann talks to WAGO about the opportunities and challenges.

digitalisierung_referenz_karl-heinz-niemann_x6_2000x1500.jpg
Interview

Making Life Hard for Hackers

Bernd and Marcel Steinkühler from Correct Power Institute, an IT specialist, discuss attacks from the Internet and potential defenses – for example, with WAGO Controllers.

digitalisierung_referenz_antsorg_interviewportait_bernd-steinkuehler_marcel-steinkuehler_x2_2000x1500.jpg
Interview

Smart Factory and Cybersecurity

Professor Jörg Wollert explains what steps should be the first on the path to the Smart Factory. He also points out where corporations cannot afford to drop the ball.

digitalisierung_interview-wollert_portait_prof-wollert_2000x1500.jpg
Your contact person at WAGO

Industry Management

unternehmen-market-management-industry-process-gettyimages-154894764-435

Additional service offerings: