Accelerating the
Industrial Internet of Things

Carmaker Holds the Keys to Network Security

Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security

Huawei Huawei
View Full Case Study
Contact Vendor
Feature New Record
OVERVIEW
FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.

FAW-Volkswagen Automotive Company (FAW-VW) is a Chinese joint venture between First Automobile Works (FAW) and Volkswagen Group. The enterprise has almost 20,000 employees working in three major production bases and 500,000 employees working along the vehicle production chain in 1,000 related enterprises.
The Terminal Security Management (TSM) system was installed to divide the intranet into several logical parts, enabling centralized system management and domain-based security protection. Key devices deployed in redundancy mode ensured service continuity.

The TSM performed access control on the network, terminals, and network boundaries. Security protection measures, such as user authentication, security check, access control, operation monitoring, emergency response, and log audition, ensure network security.

Hardware Components
- HUAWEI Terminal Security Management (TSM) system
- Security Access Control Gateway (SACG)

Security protection measures, including user authentication, security check, access control, operation monitoring, emergency response, log audition
M2M
Emerging (technology has been on the market for > 2 years)
OPERATIONAL IMPACT
Universal Platform - Unified security policy customization is enabled through the TSM system centrally manages FAW-VW’s terminals.
Data Safety - Refining user rights management policies has ensured that users have the access rights to resources only required in their service of operation.
Data Aggregation - Cloud solutions enable aggregation of 'big data' to enable more robust analysis and lower costs.
IOT SNAPSHOT
The IoT ONE Radar indicates the mix of hardware, software and services used in an IoT solution.
Hardware
Technologies that enable legacy devices and other systems to connect to the IoT. They integrate technologies and protocols for networking.
Products used by end users that contain IoT technologies. Examples include enabled equipment, wearables, hand-held scanners, and tracking devices.
Software
Data management solutions capture, index and store data in traditional database, cloud platforms, and fog systems for future use.
Security software provides encryption, access control, and identity protection to IoT solutions from data collection through end-user applications.
Services
System integrators link IoT component subsystems, customize solutions, and ensure that IoT systems communicate with existing operational systems.
IoT data management consultancies help to make sense of big data, decide which data to maintain and for how long, and troubleshoot IT issues.
NEW CASE STUDY ALERT
Get notified when Huawei publishes a new case study.