The strategic role of channel partners in enterprise cyber resilient storage solutions

By James (JT) Lewis, Director of Channel Operations for EMEA and APJ at Infinidat.

  • 22 hours ago Posted in

A significant transformation is underway in many manufacturing enterprises, triggered by greater interaction between Operational Technology (OT) and IT systems. Channel partners should be aware of how this trend has implications for cyber security and help their clients to mitigate the risks. Sharing insights like these creates an opportunity to add more strategic value during consultations and strengthen the trusted technology partner relationship. Here’s why.

Traditionally, OT systems have focused on controlling physical processes and equipment. In contrast, IT systems handled data processing and business operations. These two systems have evolved in recent years and the traditional separation between the two is very rapidly disappearing, as manufacturers embrace digital transformation and Industry 4.0 to drive efficiencies. The result is an integrated approach that enables real-time monitoring and data analysis, improved efficiency and enhanced productivity across the entire manufacturing operation. It means communication between shop floor operations and enterprise-level systems is seamless, leading to better decision-making and better optimised production processes. 

The Manufacturing Execution System (MES) lies at the heart of the integration between OS and IT. It supports the planning, monitoring, documentation and control of manufacturing processes in real-time. It also links higher-level ERP systems and industrial automation systems through process and machine control systems. Data flows seamlessly between production equipment and business systems, allowing for comprehensive visibility and optimisation of manufacturing processes. Enterprises can now make data-driven decisions based on real-time information, significantly enhancing their operational capabilities. This offers huge advantages to manufacturers, but integration also brings many risks and vulnerabilities - which channel partners, in their role as trusted technology partners, should be communicating to clients. 

One of the biggest risks is a potential data breach/cyber threats and new research from Deloitte conducted with the Manufacturing Leadership Council in 2024 quantifies this. The study reported that 48% of manufacturers experienced at least one data breach in the past 12 months, with an average cost of £2.1 million per breach. By helping manufacturers to understand these risks comprehensively, channel partners have a unique opportunity to position themselves as strategic advisors rather than just technology vendors, creating stronger, more successful long-term relationships.

Integration brings vulnerability

As OT and IT systems become interconnected, they also become more vulnerable to cyber threats that specifically target enterprise storage systems. According to a 2024 survey by industry research firm Omdia, 80% of manufacturing firms had experienced a significant increase in overall security incidents and breaches in 2024. The same study also found that less than 50% of manufacturing firms are prepared for the threat of these cyber security breaches, leading to significantly increased risk. This is critical because data is one of a manufacturing company’s most valuable assets. With enterprises globally suffering an average of >1,650 cyberattacks per week, it is not a case of if you will suffer a cyberattack, but when, and how often.

Devastating impact of storage targeted attacks

A ransomware attack on enterprise storage systems can cripple a manufacturer, completely halting production processes as data and files become encrypted and inaccessible. Such an attack can also compromise the entire manufacturing operation, from design and engineering data to supply chain management information. If key files are encrypted, the enterprise may not have access to product specifications, production schedules, and customer orders. Operations can be brought to a standstill and the implications are far reaching, potentially also damaging long-term projects, customer relationships and the business reputation.

Data published by the manufacturing industry body, Make UK, corroborates this. Its most recent report published in 2023 highlighted that during the previous year, nearly half of British manufacturers suffered cyberattacks. A quarter of affected companies reported losses ranging from £50,000 to £250,000, but the financial implications were just one aspect of the problems encountered - 65% also experienced production downtime and a further 43% faced reputational damage.

That’s not all. Modern ransomware attacks have evolved beyond simple encryption to also include data exfiltration. Sensitive intellectual property and proprietary manufacturing processes can be stolen and sold on dark web marketplaces, causing long-term damage to an enterprise’s competitive position. Furthermore, if personally identifiable information is compromised during these breaches, manufacturers may face significant regulatory penalties under frameworks like GDPR.

Switch from prevention to recovery

The cyber security landscape has now evolved to a point whereby expecting to completely prevent a cyberattack is unrealistic. Cyber criminals are continuously refining their techniques, often applying social engineering and phishing campaigns that bypass traditional security measures. This means manufacturers need to shift the focus away from prevention alone to ensuring a rapid recovery when, and not if, a cyberattack occurs.

This shift in perspective is particularly critical because cyber criminals typically don't discriminate between targets based on company size or industry prominence. Any enterprise is fair game. Small, regional manufacturers face the same sophisticated threats as multinational corporations, so ensuring cyber resilience across the entire manufacturing sector is essential.

Cyber resilience is also a regulatory requirement

Depending on the scope of an enterprise’s business operations, cyber resilience may also be a legal requirement. In the EU, manufacturers must comply with the NIS2 directive (2024). The situation for UK manufacturers is more complicated because although NIS2 does not directly apply to all UK companies due to Brexit, it may apply if they have operations or customers based in the EU. This is equally true if a manufacturer has operations in the US or Japan – both of which have similar cyber regulations to the EU and the UK. 

In addition, the UK continues to operate under its own NIS Regulations (introduced in 2018) and is updating its cyber security framework through the upcoming Cyber Security and Resilience Bill. This Bill is expected to be presented to Parliament later in 2025. Clearly, what all manufacturing enterprises need now more than anything is the strategic guidance to develop a cyber resilient storage infrastructure. Channel partners could be adding significant value here by sharing these foundations.

Five foundations for cyber resilient storage

A cyber resilient storage infrastructure to support manufacturing business continuity is built on five key principles:

1. Immutable Snapshots

Rather than creating simple backups, manufacturers need secure, unalterable data copies taken at specific intervals. These immutable snapshots ensure that critical production and business data remains unchanged after creation, providing a reliable recovery source regardless of attack sophistication.

2. Logical and Remote Air-Gapping

Effective cyber resilient storage requires logical isolation of immutable snapshots from network access. Air-gapping - implemented locally, remotely, or both - creates an additional protection layer that keeps recovery data segregated from potential infection vectors.

3. Automated Detection and Response

The speed of modern cyberattacks renders manual monitoring insufficient. Manufacturing companies need automated cyber security capabilities that integrate seamlessly with their existing security stack, including Security Operations Centres (SOC), Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response (SOAR) platforms. These systems should automatically trigger immutable snapshots when security incidents are detected.

4. Fenced Forensic Environment

Recovery from cyberattacks requires a completely isolated network environment for forensic analysis. This "fenced" area allows for thorough data testing and integrity verification, ensuring that recovered data isn't compromised before reintroduction to production systems.

5. Near-Instantaneous Recovery

Critical for manufacturing operations is the ability to retrieve clean data copies within minutes, regardless of dataset size. Manufacturing processes are particularly time-sensitive, making rapid recovery capabilities essential for minimising production disruption and financial losses.

Storage decision making gets strategic

The basic principles of building a cyber resilient storage infrastructure may be well-understood, but a successful implementation is more challenging. It calls for a strong strategic technology partnership between technology vendors, channel partners and the end user enterprise. When evaluating a storage vendor, manufacturing companies should look beyond the traditional criteria, like capacity, speed, price/performance-ratio, and the availability of a flexible consumption model. Channel partners can help customers perform this analysis and potentially also support the final implementation process. 

Today's threat landscape demands a more strategic approach, with equal consideration to cyber resilience capabilities. And when supported by partners to implement a comprehensive cyber resilient storage infrastructure, manufacturers can protect their most valuable asset – data - while ensuring business continuity, even in the face of sophisticated cyberattacks.

By Nick Ewing, Managing Director, EfficiencyIT.
By Markus Nispel, CTO of EMEA, Extreme Networks.
Navigating a Changing Environment | Hardware Habits for a Changing World By Ollie Walters,...
By Ollie Walters, Techbuyer.
By Nicholas Lynch, Principal Consultant at NetSPI.
Neal Griffiths, Chief Experience Officer at Matrix Booking, explores the integral relationship...