A blog by Oleg Shilovitsky
Information & Comments about Engineering and Manufacturing Software

PLM: Data Protection and Security Approaches

PLM: Data Protection and Security Approaches
olegshilovitsky
olegshilovitsky
17 September, 2009 | 2 min for reading

data-protectionI want to touch and discuss an issue of data protection. When thinking about Product Lifecycle Management and related disciplines, IP protection and data security are obviously very important. However, I’d like to take in the context of another very important and growing trend in PLM, in my view need to expand Product Lifecycle Management beyond the level of engineering department.

Product Lifecycle Management discipline and implementations are growing. The big potential PLM return can come together with an ability of PLM to proliferate in business process and activity PLM manages to the overall organizational value chain including extended enterprise of various types of subcontractors. In order to achieve that PLM develops and invests various abilities to integrate and exchange information with different organizational systems. But, at the same time, massive product information exposure brings risk that company IP will be lost and get into competitor hands. This is especially true with latest development and trends related to the ability to “socialize PLM”. Internet and other related technologies are very open and put company IP at high risk.

With such an introduction and background, I want to propose few possible approaches how PLM can manage IP protection with everything related to product development, manufacturing and supply chain.

1. Application level. With such approach IP protection will be managed secure access to data in the way a specific set of applications can do so. PDM / PLM / ERP and any other products in IT will have consolidated definition of security and authorization rules. The advantages of such method is in diversification of data protection and, probably certain level of simplicity. The main disadvantages I see are related to overlapped definitions and potential lack of consistency between different application domain.

2. Middleware/IT. This approach assumes the existence of cross-organizational systems (such as enterprise portals, master data management etc.) that place a role of cross functional domain holders for product data and IP. Sometime, specific enterprise application such as PLM or ERP can play a role of the overall umbrella. However, I don’t see it as happens very often. The advantage is the absence of overlap and consistency in the definition. From the opposite view, this approach increase, an overall complexity in product IP management. I do see options 1 and option 2 as co-existing options.

3. Data Level. Let me dream about another possible option data level. One of the possible future directions in data protection is to make authorization and security mechanisms to become a part of data itself. You can get initial conceptual thoughts about that in protection of PDF files and some Web and REST architecture principles.

This is my short analyzes and thoughts so far. I think data protection and security will play a very significant role in planning of future enterprise data management systems. Movement to the Web-based concepts is something I see beneficial. It can create consolidated data and information protection mechanisms.

Best, Oleg

Recent Posts

Also on BeyondPLM

4 6
11 April, 2018

Amazon will compete CAD and PLM vendors by expanding their in downstream value chain. Are you laughing? You might be...

2 June, 2017

Existing data management paradigms were formed for the last 20-30 years of software development in CAD, CAM, CAE, PDM, PLM...

20 January, 2015

An interest of customers in cloud PDM solution is growing. I guess there are multiple factors here – awareness about...

31 December, 2020

This is the last blog this year and I’d like to finish it by discussing what the PLM selection process...

22 February, 2012

I’m just few hours before two-day marathon of PLM Innovation 2012 in Munich. The list of speakers and the agenda...

10 October, 2012

I want to talk about hardware today. You probably surprised, but I hope not so much. During the last 10-15...

14 January, 2024

In the era of digital transformation, the integration of complex systems and data models has become a pressing challenge for...

27 August, 2013

The cloud trend is shifting the direction. Only few years ago, we’ve been saying cloud focus is on consumer applications...

9 March, 2010

I think, it is always fun to talk about next disruption. When you are doing so, you have a real...

Blogroll

To the top