Our Offerings
Cloud & Infrastructure
Consulting & Engineering Services
Insurance Software & BPS
Modern Workplace
Cybersecurity
Data & AI
Insurance Software
Infrastructure, App & Data Protection
Cloud Platforms
Strategize and accelerate your AI agenda
Explore our tailored options to navigate change
Ocean Network Express charts course as data-driven enterprise with SAP on Google Cloud
PKO Bank Polski establishes market leadership with online mobile banking
How integrated intelligent automation can modernize legacy ERP
The road to automated applications management
DXC AI solutions for insurance
MassMutual gains speed and agility by moving existing insurance applications from mainframe to the AWS cloud
MEMIC ensures accurate and compliant policies as it expands insurance footprint across the U.S.
Generative AI in insurance: A balancing act of risk and impact
See how DXC can remove the migration burden from your staff while creating a modern, secure workplace.
Enhance operational effectiveness, maintain compliance and foster customer trust
Aerospace and Defense
Automotive
Consumer and Retail
Energy
Financial Services
Healthcare
Insurance
Life Sciences
Manufacturing
Public Sector
Technology, Media and Telecommunications
Travel and Transportation
About DXC
Awards and Recognition
Careers
DXC Partner Ecosystem
Environmental, Social and Governance
Events
Investor Relations
Leadership and Governance
Legal and Compliance
Newsroom
Partnership with Manchester United
Partnership with Scuderia Ferrari
DXC Insights
Customer Stories
Growth Drivers
Industry Spotlights
Knowledge Base
Pivotal Moments: A customer video series
SAP + Databricks: Putting data and AI to work
United Airlines improves travel above and below the wing
Putting zero trust to work—for our clients and ourselves
Industry Spotlights | July 15, 2025
Today’s factories are no longer isolated silos of machines. Manufacturing has become a hyperconnected ecosystem where IT and operational technology (OT) systems share data, AI automates decisions, digital twins simulate entire operations, and third-party devices plug directly into production lines.
These systems are built for efficiency, but they also introduce new risks to operational security.
If trust is misplaced or unverified at any point, the consequences can threaten worker safety, product quality and public welfare. And even minor lapses in trust can have severe consequences, as they can ripple through complex manufacturing environments.
Traditional security models treated networks like moated castles—anyone or anything inside the perimeter was assumed safe. But as manufacturing environments have evolved, that assumption has become a liability.
To stay resilient, manufacturers are adopting zero trust: a security model that verifies every user, device and interaction—continuously.
In modern factories, IoT sensors monitor everything from pressure to temperature. AI decides when to trigger shutoffs. And cloud platforms manage global workflows. Every connection is a potential entry point, and attackers know it.
This approach isn’t theoretical. DXC is applying zero trust principles across its own enterprise, and for clients everywhere, improving security posture and business resilience.
Manufacturing is now the most targeted industry for ransomware, accounting for up to 29% of reported attacks according to CheckPoint Research.
And this isn’t just about data loss. When OT systems are compromised, the impact is often physical and immediate. Think shutdowns, broken supply chains or even nationwide disruption.
With manufacturing systems underpinning everything from food and pharmaceuticals to energy and defense, the stakes couldn’t be higher. In an environment where uptime and safety are paramount, the only safe assumption is that everything—human or machine—can be compromised.
That’s where a zero trust approach comes in.
The importance—and fragility—of manufacturing
In April 2025 power outages across Spain and Portugal brought trains, hospitals and factories to a standstill. Though evidence does not indicate it was caused by a cyberattack, the incident underscored the real-world disruption a single point of failure can cause.
Zero trust starts with a simple principle: never trust, always verify. Every access request—whether from a person, machine or application—is assessed in real time against a set of dynamic criteria: Who? What? When? Where? Why? Which?
This is more than identity verification. It’s about understanding behavior, device health and context before granting any level of access.
In manufacturing, that goes beyond verifying people. Machines need identity too. Every system must enforce least-privilege access, allowing users and devices to do only what they’re authorized to do. And every action must be logged automatically, so teams can track who did what, when and why to support compliance and incident response.
For example, a programmable logic controller (PLC), which is a specialized computer for controlling automated processes and equipment, should only accept instructions from verified apps or authorized engineers.
Despite rapid digital transformation involving cloud platforms, autonomous robotics, AI and IoT, many manufacturers still rely on outdated security models like flat networks, legacy PLCs and minimal access controls. These systems were designed for reliability, not resilience. Add the explosion of remote access tools and third-party integrations, and the attack surface has grown significantly.
Zero trust offers a practical blueprint for manufacturers. Here’s our advice for implementing a zero trust approach:
Without this kind of robust approach in place, it can be challenging for organizations in manufacturing and other industries to have a clear picture of who has access to critical assets and data, and how they are using it.
As a result, companies can unnecessarily expose themselves to costly data breaches and other security incidents.
Manufacturing isn’t the only industry grappling with the risks of converging physical and digital systems. Finance, healthcare and utilities—anywhere physical infrastructure meets digital control—face similar challenges.
Whether it’s hospital ventilators, power grids or payment terminals, the principle remains: when physical operations are controlled digitally, the potential impact of a breach becomes far more serious.
That’s why zero trust is gaining traction far beyond the factory floor. At DXC, we’re seeing cross-sector customers recognize that zero trust needs to be an enterprise-wide initiative.
With its deep experience in zero trust architecture and identity and access management, the DXC team is helping organizations embed zero trust into every layer of the enterprise—security, IT, operations and culture.
The core principle behind zero trust—verify everything, every time—is industry-agnostic. It applies whether you're protecting a smart factory, a hospital ward or a financial transaction.
And the good news is that DXC experts are there to guide organizations in different sectors on their zero trust journey to safeguard critical systems, improve visibility and ensure operational continuity.
DXC’s full range of security expertise includes deep experience in zero trust architecture and identity and access management, with over 450 million digital identities under management, along with world-class detection and response capabilities.