About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CyberArk and Device Authority, in Collaboration With Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, automated access management and device lifecycle protection.

The manufacturing industry is rapidly transforming to digital, driven by the coming together of the Internet of Things (IoT) and Operational Technology (OT), with countless devices connected to optimize operations. Each connected device potentially introduces new cybersecurity vulnerabilities. The NIST reference architecture for IoT, introduced in May 2024, provides a structured approach to secure onboarding, continuous device management and threat monitoring across the device lifecycle. The collaboration between Microsoft, CyberArk and Device Authority helps organizations translate this framework into practical, scalable solutions.

Each partner brings essential capabilities to this end-to-end solution architecture for NIST compliance.

  • Through Microsoft Azure IoT and Defender for IoT, Microsoft enables secure, scalable device management and real-time monitoring. The cloud-edge integration ensures consistent device security, even in remote, air-gapped environments.
  • CyberArk’s modern privileged access management capabilities restrict unauthorized human access to critical devices and systems, enforcing user and device security policies without the need for time consuming, error-prone manual human intervention.
  • Device Authority automates secure device onboarding, identity credentialing and encryption, minimizing human error, accelerating incident response and maintaining data integrity through the connected ecosystem.

Device Authority CEO Darron Antill, commented, “Manufacturers often face unique security challenges, particularly at the edge, where devices operate in remote or decentralized locations. Edge environments introduce added vulnerabilities thanks to high device density, varying network connectivity, and intermittent monitoring, but there is still the need for real-time decision-making. This complex environment requires a solution operating across widely dispersed devices and locations to help ensure device and data security and operational continuity. Our joint solution addresses these challenges with a unified solution that enables manufacturers to protect devices from malicious access and maintain operational resilience, even in the most distributed settings.”

Clarence Hinton, Chief Strategy Officer at CyberArk, added, “The complexity of the security challenges faced by manufacturers, in particular, means that no single solution can enable an organization to be fully compliant with important NIST guidelines, while creating a piecemeal solution is impractical. By joining forces, we are smoothing the way for people to implement NIST compliance best practices, extending privileged access management controls across the entire spectrum of identities.”

Dayan Rodriquez, Corporate Vice President, Manufacturing & Mobility, Microsoft, concluded, “As connected technologies become more embedded in manufacturers operations, protecting these devices is critical. This collaboration provides manufacturers with a comprehensive approach to their IoT security, directly aligned with NIST’s latest guidelines. With an ecosystem-based security solution, manufacturers can protect their operations from the factory floor to the edge, ensuring regulatory compliance and resilience against cyber threats.”

Further reading

About Device Authority

Device Authority secures the connected future by automating Zero Trust security at scale and is a recognized global leader in Identity and Access Management (IAM) for Enterprise IoT ecosystems. Device Authority’s KeyScaler identity security platform and KeyScaler-as-a-Service (KSaaS) allow organizations to reduce human error and accelerate incident response, minimizing risk, ensuring complete device and data trust, and enabling trusted AI in any connected environment.​

Keep updated by visiting www.deviceauthority.com, following @DeviceAuthority and subscribing to our BrightTALK channel.

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.

Copyright © 2025 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.