Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.


Exploring today's technology for tomorrow's possibilities
The rewards—and risks—of IIoT-hero.jpg

The rewards—and risks—of IIoT

Are the advantages worth the challenges?

It’s being called the Fourth Industrial Revolution, and that’s not entirely an exaggeration. But the IIoT, or Industrial Internet of Things, is not one thing on its own. Like the Internet of Things that you already use in your home and office, the IIoT utilizes sensors that can transmit data and networks that can carry that data. We’ve had these things for a while. But the IIoT is finally having its moment in the spotlight because of these three advances:
  • Better sensors that can be implemented on a mass scale
  • Faster networks (notably 5G) that can carry the data in real time
  • And most importantly, analytics and machine learning that can handle a constant flow of massive data beyond speeds humans are capable of assessing
While IIoT requires upfront tech expenditures, its ability to optimize production, send alerts for machines that need repairs, and reduce a company’s overall carbon footprint makes it a smart return on investment. And businesses know it. This year manufacturers, transport companies, and utilities will spend a combined $329 billion on IIoT—more than triple the spending of consumer IoT, according to tech analyst IDC.
But any major business change also comes with risk. IoT devices have gained a reputation of being insecure, and many traditional businesses aren’t prepared for the potential security challenges they pose. “Every industry in the world will need to be concerned about what they have on the internet,” said Tommy Gardner, Chief Technology Officer at HP. “These [IoT devices] are products that are hanging on connections through the world wide web.”
And here’s where smaller businesses have an advantage: With fewer sensors, machines and end points to worry about, you can implement an IIoT network more efficiently and securely. Here’s what your IT team needs to know about the IIoT security to get started.

Devise a plan to connect old and new.

Manufacturers “have this industrial equipment they purchased 30 years ago, and they’re not going to replace it for 30 more years, because it’s a major capital investment,” Gardner explains. “They can’t afford, every two years, to throw out the old stuff and bring in the new stuff—they’re just going to have to live with what they’ve got.” And if you can’t replace a factory’s worth of equipment, you need to find the right hardware and security solutions.

Keep an eye on evolving security standards.

In the US, there are currently no official security standards for devices such as sensors, RFID tags, industrial controllers and smart cards. Right now the US National Institute of Standards and Technology (NIST) is working with the private sector to develop some through their “lightweight cryptography” initiative. “Lightweight is not meant to mean weak encryption,” Gardner says. “‘Lightweight’ just means it can operate under a CPU or a memory capacity that’s much less than you’d see in our products.” NIST is holding a workshop in November to discuss potential new standardized algorithms, so watch this space.

Be resilient.

Gardner praises the security built into HP’s 3D industrial printers, which many companies use as part of their IIoT network. “We are the only 3D printer manufacturer that has cyberprotection designed in from the start. Our machines are resilient. And what is resiliency? The way I think of resiliency is like the old Timex watch commercials. Where you show a diver off the cliffs of Acapulco who puts on the watch, swan dives into the ocean, and comes up and says, ‘it takes a licking, and it keeps on ticking.’” The key is not to be lulled into believing you can prevent every attack. Keep your defenses strong, but if a vulnerability is exploited, your system needs to be able to detect it and recover without human help. Investing in technology equipped with HP Sure Sense, which uses deep learning AI to enable real-time malware protection, is a good place to start.

Learn from past IIoT breaches.

Major IIoT security attacks aren’t just speculative, Gardner notes. Global hackers have already infected industrial networks with malware by exploiting interconnected sensors. The most famous is the Trisis attack, which wreaked havoc at a Saudi petrochemical plant in 2017; the same bad actors infected a second unspecified “critical infrastructure” facility this April. Other attacks include hackers crippling Ukraine's power grid in 2015; here in the States, hackers working for Russia were able to gain access to the control room of a US electric utilities. While these are nation state-sized attacks, there are lessons to be learned from them. Basic security measures such as applying new patches immediately and changing default login credentials can go a long way, especially when your IT team is working with operating technicians who may not be as tech-savvy. Segmenting your network can also keep operations running even if a portion of your machines are taken down. And if a hacker attempts a BIOS or UEFI rootkit attack such as a LoJax, HP Sure Start will detect this and automatically re-install an authentic HP BIOS to get you back up and running within minutes on your computer. “You could blink your eye and just missed the fact that you absorbed an attack,” Gardner adds. “And it was thrown off because the system protected itself.”
HP Sure Sense is available on the new HP EliteBook 800 G6 and other models.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

More about these products

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by; reseller offers may vary. Items sold by are not for immediate resale. Orders that do not comply with terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license.

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (