The Throughput Connection

Welcome to "The Throughput Connection"

This edition covers the impact of the NIS2 cybersecurity directive on Africa and insights from our Tech Desk. We highlight Belden’s acquisition of ProSoft Technology, Westermo’s futureproof industrial Ethernet switches, and Atop & Blackbear's Cybersecurity collaboration. Plus, a recap of Throughput’s recent exhibition success!


Words From the Tech Desk

From the Tech Desk

As we step into the new year, it’s a moment to reflect on the year that has passed. Who could have foreseen the events of the past year? At Throughput, we’ve remained steadfast in our commitment to serving clients, facing challenges head-on amidst the lingering effects of COVID-19, economic turbulence, and global developments.

This past year was remarkable, with South Africa’s general election and over 70 nations voting globally - events that will undoubtedly shape economies.

In our industry, Operational Technology (OT) and Information Technology (IT) have become crucial focal points. Striking a balance between the two, while addressing the growing importance of cyber-security and compliance, is critical for businesses in manufacturing, mining, utilities, and transportation.

As 2025 begins to unfold, the pressing question remains: Are we prepared to safeguard operations? To our valued customers, thank you for journeying with us through 2024. Your resilience inspires us. Let’s continue to thrive together in the year ahead!


New European cybersecurity directive opens Africa up to scrutiny

NIS2


The European Union (EU) has implemented the NIS2 Directive (Network & Information Security Network), a new cybersecurity regulation that, like the GDPR, mandates compliance from EU member states and global trading partners. Building on the original 2016 Network and Information Security Directive, NIS2 imposes stringent requirements, including management accountability, incident reporting, risk management, and business continuity planning.

Effective from 16 January 2023, member states had until 17 October 2024 to incorporate it into national law. NIS2 requires organizations to promptly report cyber incidents to authorities, stakeholders, suppliers, and customers, with an initial notification due within 24 hours - faster than GDPR’s 72-hour timeline. Check Point Software Technologies emphasizes the need for African businesses to develop comprehensive incident response plans and provide regular cyber-security training for IT teams and leadership.

As the EU remains Africa’s largest trading partner, with trade worth billions annually and over 18 economic agreements, compliance is critical for African businesses in sectors like energy, banking, transport, and manufacturing. With more than 80% of EU enterprises now subject to NIS2, its reach extends to global supply chain partners. To maintain trade relationships, African organizations must adopt robust cybersecurity measures to protect critical infrastructure.

Collins Emadau, Check Point partner and director at Westcon, stresses the directive's importance: “African businesses, especially in South Africa, Kenya, and Nigeria, must understand that NIS2 compliance is not just about meeting EU standards. It secures their future in the global market. Non-compliance risks heavy fines and loss of key trade partnerships.” Issam El Haddioui, Check Point's head of security sales engineering for Africa, adds, “NIS2 sets a new cyber-security benchmark. Many organizations are unaware of its depth, which exceeds local regulations.

Compliance strengthens business ties with the EU and enhances African economies’ resilience to cyber threats.” NIS2 also introduces personal liability for executives during a breach, with penalties reaching €7 million or 1.4% of global turnover, whichever is higher. This surpasses GDPR, holding leadership accountable for ensuring robust cybersecurity practices.

Christopher Tredger is the portals editor at ITWeb


Demystifying NIS2 Requirements: What You Need to Know

NIS2


The NIS2 Directive imposes essential cybersecurity requirements on companies, grouped into three key areas:

  1. Management Accountability – Leadership buy-in, responsibility, training, and liability
  2. Preventative Cybersecurity Measures – Reducing cyber risks through technical, operational, and organizational strategies
  3. Incident Reporting – Ensuring prompt and effective responses to cyber incidents

The Role of Management in Cybersecurity

Cyber threats evolve rapidly, and many organizations struggle to maintain compliance due to limited expertise and resources. Without strong security measures integrated into business decisions, companies face significant risks.

A major challenge is the lack of management buy-in - many executives view cybersecurity as a cost rather than an investment. However, under NIS2, leadership is not only responsible for approving cybersecurity strategies but can also be held personally liable for compliance failures, including potential suspension from managerial duties.

To mitigate risks effectively, cybersecurity must be a priority at the executive level. CEOs, CTOs, CFOs, and other leaders must embed strong security practices into company culture and governance, ensuring long-term resilience.

Key Cybersecurity Measures Under Article 21

Article 21 mandates companies to adopt appropriate and proportionate cybersecurity measures. These include:

  1. Technical Measures – Physical security solutions like firewalls, encryption, secure remote access, and multi-factor authentication
  2. Operational Measures – Risk management frameworks, incident response plans, and crisis recovery strategies
  3. Organizational Measures – Policies, procedures, and cybersecurity training to promote a culture of cyber hygiene

Ensuring Compliance

Organizations must document their security strategies, regularly reassess risks, and ensure management approval. Compliance audits require proof that cybersecurity investments align with risk exposure and company size.

Failure to meet NIS2 standards can lead to regulatory fines and mandatory corrective actions. Companies must proactively implement and review cybersecurity measures to protect their operations and ensure long-term compliance.

For field engineers, understanding these requirements is crucial. Implementing robust security frameworks not only protects infrastructure but also safeguards business continuity in an increasingly digital world.


Belden Acquires ProSoft Technology, Launches Belden Horizon

ProSoft Technology, a trusted name in industrial automation connectivity, has officially joined Belden, a leader in innovative industrial automation solutions. With this acquisition, ProSoft Connect has been rebranded as Belden Horizon™, signalling an evolution in secure remote connectivity.

Belden Horizon retains ProSoft’s Secure Remote Access (SRA) and Persistent Data Network (PDN) technology, providing intuitive, secure, and always-on remote access to industrial equipment. Enhanced with features like two-factor authentication and Virtual Lockout-Tagout, the platform ensures robust data acquisition and orchestration.


Westermo Industrial Ethernet Switches: Futureproofing Critical Data Networks

Westermo Lynx 3000 series


Westermo has introduced the Lynx 3000 series, a powerful range of compact industrial Ethernet switches and routers designed to meet the evolving demands of high-performance data communication networks in transportation, manufacturing, and energy distribution. These switches offer gigabit speeds, advanced functionality, and exceptional reliability to support current and future mission-critical applications. The Lynx 3000 series provides both layer 2 and layer 3 functionality, enabling management of complex ring networks and routing solutions. Its versatile models range from entry-level options optimized for Fast Ethernet to variants supporting up to 2.5 gigabit speeds, ideal for big data, high bandwidth, and critical applications.

Powered by the WeOS operating system, the series simplifies installation, operation, and maintenance through an intuitive web interface, reducing the need for specialized IT support. WeOS also ensures long-term compatibility with evolving communication protocols. To address growing cybersecurity concerns, the Lynx 3000 series includes a robust suite of tools to enhance cyber resilience and support compliance with IEC 62443, a standard for securing data communication networks.

Designed for heavy industry, marine, and rail applications, the switches meet stringent industry standards for use in harsh environments, including those with high electromagnetic interference, extreme temperatures, humidity, and vibration. An IP40-rated metal housing, industrial-grade components, and high interface isolation ensure reliability, extended service life, and reduced total cost of ownership. The series also offers PoE-enabled models, providing communications and power over a single cable. With up to 30W per port, these switches are ideal for HD IP CCTV cameras and other high-power applications, reducing network complexity and cost. “Our Lynx 3000 series is built to handle today’s networking challenges and the increasing bandwidth demands of tomorrow,” said Henrik Jerregård, VP of Products and Marketing at Westermo.


Atop & BlackBear - Strengthens Cybersecurity

Atop & BlackBear - Strengthens Cybersecurity


As industrial automation and operational technology (OT) systems face increasing cyber threats, Atop Technologies and BlackBear Cyber Security have formed a strategic partnership to enhance cybersecurity in critical industries.

Atop Technologies, a global leader in industrial networking solutions, provides Ethernet switches, gateways, and embedded computing designed for secure and reliable OT environments. BlackBear Cyber Security specializes in threat detection and risk mitigation, safeguarding industrial control systems (ICS) from cyberattacks.

This collaboration combines Atop’s high-performance networking solutions with BlackBear’s cybersecurity expertise, ensuring scalable and resilient OT infrastructure. The partnership strengthens industrial networks against evolving threats while maintaining seamless connectivity and data integrity in manufacturing, energy, transportation, and smart cities.

As industries adopt IoT, AI-driven automation, and cloud connectivity, securing OT systems is more critical than ever. Atop and BlackBear’s alliance will drive cyber defense innovation, delivering next-generation security solutions that proactively detect, prevent, and mitigate risks, ensuring a safer and more resilient industrial future.


Throughput Shines at Recent Local Exhibitions

Throughput Shines at local Exhibitions

Throughput recently took part in local exhibitions, leveraging the opportunity to connect with existing and new customers while show-casing our latest hardware and solutions. These events offered valuable insights into market sentiment and emerging industry needs.

It was a pleasure to reconnect with industry colleagues and engage in meaningful discussions about current challenges and future market trends. The feedback gathered helps us address customer challenges and refine our solutions to meet evolving demands.

We remain committed to providing cutting-edge technology in industrial data communications and look forward to seeing you at future exhibitions!

Feel free to connect with us or visit our Virtual Showroom.