Accelerating the Industrial Internet of Things
Log In
Huawei Case Studies Carmaker Holds the Keys to Network Security

Carmaker Holds the Keys to Network Security

Huawei
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
Automotive
Information Technology
Production - Manufacturing
IPv6
FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.

Read More
FAW-Volkswagen Automotive Company (FAW-VW) is a Chinese joint venture between First Automobile Works (FAW) and Volkswagen Group. The enterprise has almost 20,000 employees working in three major production bases and 500,000 employees working along the vehicle production chain in 1,000 related enterprises.
Read More
The Terminal Security Management (TSM) system was installed to divide the intranet into several logical parts, enabling centralized system management and domain-based security protection. Key devices deployed in redundancy mode ensured service continuity.

The TSM performed access control on the network, terminals, and network boundaries. Security protection measures, such as user authentication, security check, access control, operation monitoring, emergency response, and log audition, ensure network security.

Hardware Components
- HUAWEI Terminal Security Management (TSM) system
- Security Access Control Gateway (SACG)

Read More
Security protection measures, including user authentication, security check, access control, operation monitoring, emergency response, log audition
Read More
M2M
Read More
Emerging (technology has been on the market for > 2 years)
Read More
Universal Platform - Unified security policy customization is enabled through the TSM system centrally manages FAW-VW’s terminals.
Data Safety - Refining user rights management policies has ensured that users have the access rights to resources only required in their service of operation.
Data Aggregation - Cloud solutions enable aggregation of 'big data' to enable more robust analysis and lower costs.
Hardware
Technologies that enable legacy devices and other systems to connect to the IoT. They integrate technologies and protocols for networking.
Products used by end users that contain IoT technologies. Examples include enabled equipment, wearables, hand-held scanners, and tracking devices.
Software
Data management solutions capture, index and store data in traditional database, cloud platforms, and fog systems for future use.
Security software provides encryption, access control, and identity protection to IoT solutions from data collection through end-user applications.
Services
System integrators link IoT component subsystems, customize solutions, and ensure that IoT systems communicate with existing operational systems.
IoT data management consultancies help to make sense of big data, decide which data to maintain and for how long, and troubleshoot IT issues.
Download PDF Version
test test