Download PDF

Secure Production Data, Secure Business

The textile industry is one of the pioneer sectors in the rise of truly globalized supply chains. Fashion brands or high-tech fabric makers often operate a globally dispersed business, with designers far away from the actual production of their creations. ZSK Stickmaschinen GmbH stands as a critical lynchpin in that global system, as invaluable and much-coveted designs and production data pass through its high-tech design tools and embroidery machines – an alluring target for product pirates and more ruthless actors on the grey market.

    WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and intelligent device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms.
  • Equipment & Machinery
  • Product Development
  • With over a century of innovation in textile engineering to its name, ZSK Stickmaschinen GmbH is respected as a hallmark for quality, precision, and reliability in innovative single and multi-headed and specialized embroidery machines. Its technology is favored by users in all areas of the textile industry, from regular branded apparel to high-tech fabrics and the promising field of wearable electronics.

  • ZSK Stickmaschinen relies on Wibu-Systems to protect its own business model and the legitimate business of the users of its machines. CodeMeter allows only the correctly licensed use of the embroidery machines; by encrypting the software controlling the ZSK machines and the production data, Wibu-Systems’ technology stops would-be IP thieves from stealing invaluable branded designs and counterfeiters from replicating the textile machines’ inner workings themselves.

    With a tiny CmDongle slotted unobtrusively into its machines, ZSK Stickmaschinen achieves its double purpose: The integrity of its own technology and the designs of its clients are protected, and the system becomes a strong gatekeeper in a globalized and virtualized business: Versatile licensing allows complete control over production volumes and ensures that data can move through the collective network without the threat of manipulation. Access to client documents is securely limited to legitimate users and, optionally, to specific periods defined by the license.

  • Data Security, IP Address, Process Documentation , Production Efficiency, Volume
  • Emerging (technology has been on the market for > 2 years)
  • Impact #1
    [Data Management - Data Security]
    Complete control over production volumes, data can move through the collective network without the threat of manipulation. Access to client documents is securely limited to legitimate users.
    Impact #2
    Impact #3
  • Intrusion Detection Systems (IDS)
    Intrusion Detection Systems (IDS) are devices or software applications that monitor network or system activities for malicious activities or policy violations and send reports to a management station.ID systems are being developed in response to the increasing number of attacks on major sites and networks, including those of the Pentagon, the White House, NATO, and the U.S. Defense Department. The safeguarding of security is becoming increasingly difficult because the possible technologies of attack are becoming ever more sophisticated; at the same time, less technical ability is required for the novice attacker, because proven past methods are easily accessed through the Web. 
© 2020 IoT ONE