By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Signify’s Interact Lighting System Wins DEKRA Cybersecurity Award

Signify's Interact Lighting System Wins DEKRA Cybersecurity AwardSignify announced that its Interact cloud-based wireless lighting system has been awarded the DEKRA IEC 62443-3-3 security certification. This certification is a mark of confidence that the Interact system and services are private and secure against ever-evolving information security threats. This certification confirms the resilience of the Interact system and is the latest step in Signify’s ongoing efforts in cybersecurity assurance.

Signify was among the first lighting companies to certify its development lifecycle process against IEC 62443-4-1, the international standard for security of industrial control systems and operational technology. Signify’s cloud solutions are also certified against ISO 27001, a reputed international standard for information security.

The Interact system, which includes a network of wireless connected luminaires and devices, is centrally managed and controlled through a cloud-based software suite called Interact building manager. With Interact building manager you can easily manage, monitor and maintain your lighting resulting in a better place to work, improved staff efficiency, and maximum energy savings.

Greg Nelson, Executive Vice President – Systems & Services at Signify said,“In today’s interconnected digital world, it is critical that all companies build trust with partners and customers. Attaining this DEKRA certification demonstrates our commitment to the highest level of cybersecurity within our automation and control systems.

IEC-62443-3-3 focuses on the principle of a secure Industrial Automated Control Systems (IACS) and other parts of the standard series. Certification is awarded based on tests against seven pillars:

  • Access control – only authorized users can access the system
  • Use control – only authorized actions can be performed in the system
  • System integrity – the system and its data are protected from unauthorized changes
  • Data confidentiality – sensitive data is safeguarded from unauthorized access and disclosure
  • Restricted data flow – data can only flow between controlled system components, preventing unauthorized access or information leaks
  • Timely response to events – detects and responds to a cybersecurity threat
  • Resource availability – ensures that system resources remain available and functional during a cybersecurity incident.

Tags

Vidushi Saxena

Passionate journalist with a Bachelors in Journalism and Mass Communication, dedicated to crafting compelling news articles and avidly exploring the dynamic world of current affairs through insightful blog readings. Embracing the power of words to inform and inspire.

Related Articles

Upcoming Events