"Without security, there is no safety."
                       - Steve Hanna, Senior Principal, Infineon Technologies
                       - Steve Hanna, Senior Principal, Infineon Technologies
The trustworthiness of an IIoT implementation is rooted in endpoint protection. In Chapter 1, An Unprecedented Opportunity at Stake, the tremendous business and social opportunities tied to the industrial internet were discussed at length. Inadequate trustworthiness at any point in the value chain poses a major threat to those optimistic claims. This further highlights the importance of securing IIoT endpoints.
An endpoint can be any node in the IIoT architecture that generates or receives data and/or control signals. An endpoint may also route data packets, or can be a storage...