Stratasys Ltd.

06/17/2025 | Press release | Distributed by Public on 06/17/2025 11:54

Addressing Cybersecurity Threats in the World of 3D Printing

Common Cybersecurity Challenges in Additive Manufacturing

Threat

Description

IP Theft

CAD files, material selections, and build configurations represent valuable trade secrets.

Network Intrusion

Printers on unsegmented networks can be used as an entry point for attackers.

Firmware Tampering

Unauthorized changes to firmware could result in failed prints or worse-functional sabotage.

Data Over -Collection

Some users fear "surveillance creep" as telemetry expands without clear opt-outs.

Cloud Vulnerabilities

Remote print prep, job queuing, and analytics are powerful-but also exposed.

Compliance Gaps

Regulations like GDPR, ITAR, or DoDI require strong safeguards, even in non-financial sectors.

Information Assurance: Building Trust Through Resilience

Cybersecurity is essential-but for industries where reliability and compliance matter most, information assurance is the broader goal. It means not only defending against attacks but ensuring the confidentiality, integrity, and availability of every data point in your 3D printing workflow.

Stratasys solutions are built with this mindset. From secure firmware and encrypted communications to offline modes and strict access control, our platform is designed to help customers maintain operational continuity, meet regulatory obligations, and safeguard sensitive data.

Whether you're operating in defense, aerospace, or any high-security environment, Stratasys gives you the tools to ensure trust-not just protection.

Stratasys' Multi-Layered Cybersecurity Approach

Stratasys follows a Secure Software Development Lifecycle (S-SDLC) and supports ISO 27001 standards. Its security approach is built on three pillars:

1. People & Process Controls

  • Employee training (phishing, SOPs, secure onboarding/offboarding)
  • Role-based access control for software and admin features
  • Zero-trust and least-privilege data access models

2. Product-Level Safeguards

  • Offline operation modes in GrabCAD Print
  • MTConnect-based telemetry with data opt-outs
  • Secure commissioning and authentication via AWS Cognito

3. Infrastructure Hardening

  • Encrypted data at rest and in transit (TLS, AES)
  • Firewalls, tamper-proof firmware, enclave controllers (e.g., F3300®)
  • AWS-hosted services with certifications like ISO 27001, SOC 2, and PCI DSS
Stratasys Ltd. published this content on June 17, 2025, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on June 17, 2025 at 17:54 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at support@pubt.io