Industry of Things Forum-Internet of Things Everywhere

Industry of Things Forum-Internet of Things Everywhere

Kumar Krishnamurthy of PwCI just attended an amazing conference, Industry of Things World USA, in San Diego. Internet of Things was discussed from many angles. The nonstop pace is the reason for no posts for two days. The 400 attendees, about 10% women, gathered from 28 countries and 234 companies. 21 companies sponsored the event, and I was one of the media sponsors. The high profile speakers, ranging from an Undersecretary of the Dept. of Commerce to Harvard Business School professor and author Michael Porter.

Check out the Twitter feed at #IoTClan.

The conference was organized from Berlin, Germany. So, how did they attract such an outstanding attendee list without running ads in major media sites–even major considered from the industry point of view. I heard about the conference from an email. Several people I talked with also heard about it from an email. The organizers, in fact, sent 1.5 million emails in the course of bringing the conference together.

They told me that it was emails and networking. A few people I talked with had been contacted by colleagues in Germany where the organizers have a track record.

Here are a few notes:

Willie May, Under Secretary of Commerce for Standards and Technology (NIST) called the IoT a new paradigm, “It’s going to be big.” NIST is working with industry and academia on standards and testbeds.

Jeff Jaffe W3CJeff Jaffe, president of W3C–the worldwide web consortium, discovered the importance of metadata and interoperability of data among apps. RESTful interfaces lie on the standards roadmap. Everyone seems to want to rename the IoT in their own way. For Jaffe, it is the Web of Things. “The Web is fueling a transition from costly monolithic software to an open market of apps. Check out the diagram showing his idea that Web technologies can enable vertical & horizontal integration. These go vertically field level to business level (low to high levels of abstraction) and horizontally as integration along supply chain to integration along the value chain.

SAP, EVP for IoT Tanja Rueckert, said, “What will really be impacted by IoT are the business processes, disruptive business models, efficiency models.”

Tom Burke, president of the OPC Foundation, discussed the value of data in his presentation to a packed room during a breakout. That showed the amount of interest in the manufacturing side of things

Lead of PwC IoT practice, Kumar Krishnamurthy, in one of the better presentations I heard “IoT from Strategy to Execution”, calld for the right focus–creating value rather than technology. He noted, “Evolution of products, integrate digital with operations, reevaluate go-to-market, manage shifts in revenue model.” Continuing a conference theme, he proclaimed, “Digital transformation is not about technology…but about creating value using an enhanced set of asset base. Technology enabled devices do not make the machines smarter…rather they enable businesses to evolve their model to serve differently. Success is not all about data and analytics…but leveraging the information with judgement and expertise.”

Michael Porter predicted that IoT (or smart products) will expand industry boundaries as well as change organizational structure.

Finally, in a presentation “IoT, Fact or Fiction, Timothy Chou,  a lecturer at Stanford and author, suggested that young students learn machine learning-static and dynamic-for the future. “Lots of sensors generate too much data. We must learn to deal with it–with machine learning a key.

He said, “Asset management was developed when things were very dumb. Now I can put a full computer in   almost everything. Why not have the machine issue the work order? It is time to rethink middleware.”

 

PTC Acquisition Bolsters Internet of Things Offering

PTC Acquisition Bolsters Internet of Things Offering

Following on to last week’s quick post of PTC’s Internet of Things acquisition of Kepware, I’ve gone a little deeper into the build up to and the strategy of the acquisition.

First off, the Internet of Things is a strategy. It isn’t a “thing.” PTC management seems to “get it.” As you’ll read further down, PTC is not pursuing a simple bolt-on strategy such as what several companies have come to me to help justify. This appears to be a serious attempt to assemble a complete ecosystem / platform going beyond a simple IoT play to offer a business solution to customers.

Warning note. PTC is acquiring software companies and attempting to blend their technologies into a coherent whole. We’ve witnessed many of these seemingly simple processes go south quickly. But PTC has done this before in its core market, then again in the services market. I have confidence the company will show the way in a complete solution.

PTC is paying a large premium for Kepware–Up to $120 million for a company with about $20 million in annual sales. It obviously thinks there is a tremendous upside to its IoT business.

From the press release: PTC announced it has signed a definitive agreement to acquire Kepware, a software development company that provides communications connectivity to industrial automation environments, for approximately $100 million, plus up to an additional $18 million based on achievement of certain strategic initiatives and financial results. The acquisition will enhance PTC’s portfolio of Internet of Things (IoT) technology, and accelerate the company’s entry into the factory setting and Industrial IoT (IIoT).

Founded in 1995 and located in Portland, Maine, Kepware serves customers in more than 120 countries in such industries as manufacturing, oil and gas, building automation, and power and utilities. The company’s flagship product, KEPServerEX, connects disparate devices and control systems, providing users with a single source of industrial data.

Kepware’s KEPServerEX will become a strategic component of the PTC ThingWorx IoT technology platform. Once the companies’ products are integrated, machine data will be able to be aggregated into the PTC ThingWorx platform, integrated with a wide array of internal and external information, and then automatically analyzed using ThingWorx machine learning capabilities. The integration will allow organizations to gain enterprise-wide insight and to proactively optimize mission-critical processes – enabling them to improve operational performance, quality, and time to market.

In its June 2015 research report, entitled The Internet of Things: Mapping the Value Beyond the Hype, the McKinsey Global Institute identified the factory as one of the largest sources of potential value to be realized from the adoption of the Internet of Things. PTC has established a dedicated business segment and has formed a strategic alliance with GE to pursue this brilliant factory opportunity. The acquisition of Kepware is intended to complement the alliance with GE.

Kepware and PTC share many common customers that will be able to realize value from the acquisition. Industrial environments already leveraging Kepware technology will be able to benefit from the added breadth of capabilities available in the PTC ThingWorx IoT technology platform. The acquisition of Kepware will also provide a fast-to-value connectivity option for PTC customers to gain visibility into data from a vast range of industrial controls and production equipment, enabling them to kick-start their smart, connected factory initiatives.

“PTC is committed to helping manufacturers, infrastructure operators, and others realize the enormous value inherent in the Internet of Things,” said Jim Heppelmann, president and CEO, PTC. “With this acquisition, we will gain entry into heterogeneous factory and operating environments with robust technology, an impressive list of customers, and a high-quality, profitable company with incredibly talented employees.”

“Kepware and PTC share a common vision of helping organizations realize the potential of the Industrial Internet of Things,” said, Tony Paine, CEO, Kepware. “We believe this acquisition will benefit our customers, partners, and employees – and ultimately drive software innovation for industrial automation markets. We are excited for the opportunity to become part of PTC.”

Over the past 12 months, privately-held Kepware generated approximately $20 million in revenue. PTC expects to draw on its credit facility to finance this transaction and expects Kepware to be neutral to its FY’16 non-GAAP EPS. The transaction is expected to close in early 2016, subject to customary closing conditions, including regulatory approval. PTC intends to maintain the Kepware partner ecosystem and to continue developing and enhancing the Kepware technology, once acquired.

PTC Internet of Things Acquisitions

2014

Thingworx

The acquisition of ThingWorx positions PTC as a major player in the emerging Internet of Things era.

Axeda

The acquisition of Axeda allows PTC to leverage its core IoT technology to enable companies to establish secure connectivity and remotely monitor and manage a wide range of machines, sensors, and devices.

2015

ColdLight

The acquisition of ColdLight’s Neuron automated predictive analytics platform will enrich PTC’s technology portfolio and extend PTC’s position as a leader in the Internet of Things (IoT) market.

GE Alliance

GE and PTC announced that the two companies are partnering to deliver an innovative manufacturing solution that will be available within GE’s Brilliant Manufacturing Suite. This new GE-branded manufacturing solution leverages the capabilities of PTC’s ThingWorx Industrial Internet of Things application enablement environment. The result is an industry-hardened solution that features flexible dashboards and powerful data analytics integrated with GE’s software capabilities on the manufacturing plant floor.

 

ThingWorx IoT Platform

  • ThingWorx Composer
    ThingWorx Composer is an end-to-end application modeling environment designed to help you easily build the unique applications of today’s connected world. ThingWorx Composer makes it easy to model the things, business logic, visualization, data storage, collaboration, and security required for a connected application.
  • Codeless Mashup Builder
    ThingWorx “drag and drop” Mashup Builder empowers developers and business users to rapidly create rich, interactive applications, real-time dashboards, collaborative workspaces, and mobile interfaces without the need for coding. This next-generation application builder reduces development time and produces high quality, scalable, smart connected applications which allows companies to accelerate the pace at which they can deliver value-add solutions, resulting in greater market share against new and existing competitors.
  • Actionable, Correlated Data from People, Systems and Things
    ThingWorx is the only platform that can store and correlate data from three dimensions: people, systems, and connected things. This capability allows companies to make business sense of the massive amounts of data from those three dimensions – making the data useful and actionable. The platform supports scale requirements for millions of devices, and provides connectivity, storage, analysis, execution, and collaboration capabilities required for applications in today’s connected world. It also features a data collection engine that provides unified, semantic storage for time-series, structured, and social data at rates 10X faster than traditional relational databases.
  • Search-Based Intelligence
    ThingWorx SQUEAL (Search, Query, and Analysis) brings search to the world of smart connected devices and distributed data. With ThingWorx SQUEAL’s interactive search capabilities, users can now correlate data that delivers answers to key business questions. Pertinent and related collaboration data, line-of-business system records, and equipment data get returned in a single search, speeding problem resolution and enabling innovation.
  • Collaboration
    ThingWorx dynamically and virtually brings together people, systems, and connected equipment, and utilizes live collaboration sessions that help individuals or teams solve problems faster. The ThingWorx data store becomes the basis of context aware collaboration and interaction among the systems users, further enhancing its value. Additionally, the tribal knowledge exposed during the process is automatically captured and indexed for use in future troubleshooting activities.
  • Flexible Connectivity Options
    ThingWorx “inclusive” connectivity strategy maximizes market opportunity and minimizes integration efforts. ThingWorx supports connectivity to devices via several methods, including 3rd party device clouds, direct network connections, Open APIs, and AlwaysOn connectivity.

KEPServerEX Overview

KEPServerEX is a communications platform that provides a single source of industrial automation data to all of applications. The platform design allows users to connect, manage, monitor, and control diverse automation devices and software applications through one intuitive user interface.

KEPServerEX leverages OPC (the automation industry’s standard for interoperability) and IT-centric communication protocols (such as SNMP, ODBC, and web services) to provide users with a single source for industrial data. Designed around the four product pillars of Proven Interoperability, Centralized Communications, On-Demand Scalability, and Industrial Strength, KEPServerEX is developed and tested to meet our customers’ performance, reliability, and ease-of-use requirements.

Product Features

KEPServerEX provides critical technical features that are centralized around accessibility, aggregation, optimization, connectivity, security, and diagnostics.

Accessibility

OPC

OPC is the leading standard for industrial automation connectivity. KEPServerEX supports the OPC Unified Architecture (OPC UA) specification and many of the OPC Classic specifications, including OPC Data Access (OPC DA), OPC Alarms and Events (OPC AE), and OPC Historical Data Access (OPC HDA).

Automation Interfaces

KEPServerEX has preferred access to leading automation software, including iFIX by GE Intelligent Platforms (NIO) and InTouch by Wonderware (SuiteLink/FastDDE). KEPServerEX also supports preferred access to Oracle MES and MOC solutions through their proprietary API.

IT Interfaces

KEPServerEX supports multiple interfaces for integration with IT applications, including ODBC for logging information to a database and SNMP for providing information to a Network Management System (NMS). With the advent of IoT and Big Data applications, KEPServerEX now includes the ability to communicate with Splunk software and cloud services via the Industrial Data Forwarder for Splunk.

Cloud Interfaces

With the IoT Gateway, KEPServerEX can seamlessly stream real-time industrial control data directly into Big Data and analytic software for Business Intelligence and Operational Excellence. Its customizable data format supports most MQTT and REST applications—enabling users to choose the vendors and communication methodologies right for their system.

Exporters

Some applications require information to be made available from a file or database. This information is typically exported at a predefined rate and includes both current and historical data. KEPServerEX has the ability to export historical Electronic Flow Measurement (EFM) data (via the EFM Exporter plug-in) or historical trend data (via supported drivers) to files and/or databases.

Aggregation

Centralized Platform

KEPServerEX is a communications platform that can support connections to thousands of data sources and provide information to hundreds of applications. The platform design simplifies the configuration of the connected applications by providing a single point of entry to all information. KEPServerEX also enables troubleshooting and issue diagnosis, provides control to the access of information based on user roles, and the ability to restrict the frequency of communications over bandwidth-limited telemetry-based environments.

Unified Configuration

KEPServerEX provides a unified configuration for managing connectivity to any data source. Anything can be added, configured, or deleted while the server is on-line and operational. Users can configure projects manually using a step-by-step wizard or programmatically through the export and import of XML and CSV files.

Data Storage and Retention

KEPServerEX is capable of archiving the real-time data it collects to local storage. By leveraging the Local Historian plug-in, applications can access this historical data (via OPC HDA) for future analysis. KEPServerEX can also store information in any ODBC-compliant database using the DataLogger plug-in, which has a store-and-forward capability for when a database is unreachable or unable to process the information fast enough.

Optimization

Data Conditioning and Reduction

In addition to providing raw values to connected applications, KEPServerEX can perform linear or square root scaling, perform basic arithmetic expressions, or apply deadband calculations on raw data and provide its aggregate. This provides minimal bandwidth and resource utilization by providing only the most critical updates.

Redundancy

KEPServerEX is used in critical applications where highly-reliable systems are required for maximum uptime. It includes the ability to define redundant network paths, primary and secondary data sources, and applicable failover criteria.

Load Balancing

In large networks that have many devices and applications requiring information, flexible control is necessary to allow for customized load-balancing of data collection and information flow. KEPServerEX provides tools to schedule the frequency of communications and throttle the demand across the network.

Communications

KEPServerEX optimizes communications with devices by aggregating identical requests from different applications whenever possible. Multiple demands on data can be batched together into the fewest requests possible. These optimizations are unique to each protocol, and are designed to reduce network overhead and device processing.

Machine-to-Machine Linking

In a typical industrial automation network, devices and controllers must communicate with one another even if they are not from the same manufacturer or do not support the same protocol. KEPServerEX provides the ability to establish links between data values in different data sources, allowing Machine-to- Machine (M2M) communications as close to the device as possible.

Connectivity

Driver-Based Access

KEPServerEX offers the broadest range of drivers available, supporting devices across various verticals within the Industrial Automation Industry. While most drivers act as masters that initiate requests, there are many drivers that can emulate a device where communications are driven by a controller. KEPServerEX drivers also support a variety of wired and wireless network mediums for Ethernet, serial, and proprietary networks. Although most drivers connect directly with hardware devices, some are designed to connect with other applications—such as databases, custom software applications, or other OPC servers.

Telemetry Environments

Industrial automation equipment can be deployed in a dry and heated factory, but it can also be installed inside a vehicle, on a remote pipeline, or in a well or pump station. In these remote environments, there are often a variety of telemetry solutions in use like cellular, radio, or satellite modems. KEPServerEX supports these telemetry configurations and provides additional ways to optimize communications through virtual networks, timing parameters, device demotion, and by scheduling communications across devices.

Rapid Deployment

As automation networks have grown from ten controllers to thousands of controllers, tools that aid and accelerate deployment are critical to a solution’s success. KEPServerEX provides many tools that speed the deployment of new devices, including Automatic Tag Generation (ATG) and Device Discovery (when supported by the device and communication protocols). Users can also export, manipulate, and import an XML project file to programmatically define the configuration.

Simulation

As systems are configured, components must be implemented and tested before the entire system becomes available. KEPServerEX allows any data source to be placed into simulation mode prior to deployment. In addition, the Memory Based driver can be configured to create a range of static and dynamic data points. The Advanced Simulator driver can leverage a database and its contents to drive application-specific simulation data into connected applications.

Security

Configuration

Access to the KEPServerEX configuration can be restricted through the User Manager. This tool allows the administrator to define user groups and users with restricted access to certain project configuration tasks, and also provides the ability to disconnect client applications.

Runtime

There are various tools available within KEPServerEX to control user access to the server, data source, or data values. The Security Policies plug-in limits access based on OPC UA user credentials while supporting default handling for anonymous users (both OPC UA and other client interfaces). The ability to dynamically address information can be disabled, limiting user access to tags defined within the project. KEPServerEX supports a number of secure client standards including SNMP (v3 security), OPC UA, and OPC DA (DCOM security) to further restrict access to the server, as well as a number of secure device protocols to meet the requirements of DNP3, SNMP, and OPC UA data sources. Secure data tunnels can be configured by leveraging multiple KEPServerEX instances at remote endpoints to pass data through firewalls and meet authentication and encryption requirements across the Internet.

Diagnostics

OPC Diagnostics

OPC Diagnostics provide a real-time and historical view of OPC events between any OPC client and the server, including method calls made by the client or callbacks made by the server. The ability to view actual communications and responses is invaluable when troubleshooting client accessibility. The diagnostics tools within KEPServerEX greatly speed deployment and reduce downtime.

Communications Diagnostics

Communication Diagnostics provide real-time capturing of the protocol frames transferred between the server and any device, as well as indications on the driver’s performance. All read and write operations can be viewed or tracked directly in an OPC client application using built-in diagnostics tags. This is useful when modifying key communication parameter settings (such as baud rate, parity, or Device IDs), because corrections are immediately visible.

Third-Party Diagnostics Integration

Diagnostics information can be viewed within KEPServerEX and by third-party applications. Diagnostics information is provided through system-defined tags and accessible to the same clients connecting to the data sources. KEPServerEX logs event information, which is accessible within the configuration tool or to any application that supports the OPC Alarms and Events specification.

Real-Time Cyber Attack Detection for SCADA Devices

Real-Time Cyber Attack Detection for SCADA Devices

cybersecuritySCADA devices and networks remain a prime target for cyber attacks. Everything I’ve written has approached cybersecurity from a different angle. This is the first solution that has come my way that uses a deception approach.

Attivo Networks announced Dec. 7, 2015 a release of its deception-based Attivo BOTsink solution that provides continuous threat detection on Industrial Control Systems (ICS) SCADA devices used to monitor and control most manufacturing operations as well as critical infrastructure such as natural gas, oil, water, and electric power distribution and transmission systems around the world. Cyberattacks on these targets can and have resulted in disruption of critical local, regional, and national government and commercial infrastructures. As a result, when they are breached, the impact on societies they serve stands to be catastrophic.

According to a study by the Pew Internet and American Life Project, 60 percent of the technology experts interviewed believe that a major cyberattack will happen. The damages to property and ensuing theft will amount tens of billions of dollars, and the loss of life will be significant.

Scalable SCADA protection

“We are proud to be the first in the industry to provide customers a globally scalable, deception-based threat detection solution for SCADA protection,” emphasizes Tushar Kothari, CEO of Attivo Networks. “Many of our customers from the energy industry have requested the extension of our Attivo Deception Platform into their production and manufacturing control networks so they can get real-time visibility and the ability to promptly identify and remediate infected devices. As one stated, ‘a breach on those networks can be catastrophic and Attivo wants to do everything we can to prevent a disaster or risk to lives.”

SCADA systems had originally been designed to monitor critical production processes without consideration to security consequences. Security had been generally handled by keeping the devices off the network and the Internet using “air gaps” where malware could only be transmitted by the thumb drives used by technicians. However, today vulnerable SCADA systems are increasingly being connected to the corporate IT infrastructure and Internet, making them easily accessible to a remote attacker.

Examples of this would be the Sandworm malware that attacked Telecommunications and Energy sectors, Havex malware that infected a SCADA system manufacturer, and BlackEnergy malware that attacks ICS products manufactured by GE, Siemens, and Advantech. These attacks primarily targeted the operational capabilities of these facilities. With the increased malicious and sophistication of malware, concerns are now escalating to fears of an irreversible disaster.

Situational awareness

“Industrial systems have increasingly come under scrutiny from both attackers and defenders,” said Chris Blask, Chair of the Industrial Control System Information Sharing and Analysis Center (ICS-ISAC). “Situational awareness is the focus of the ICS-ISAC and its membership, including the ability for asset owners to detect and respond to incidents on their systems.”

These devices generally have long lifecycles creating an exposed environment driven by equipment that is less hardened and patches made infrequently. Additionally, because of their critical functions, SCADA devices cannot be taken offline frequently or for any length of time. This, along with costs that can run into the millions for every hour the network is offline, has made patching very difficult, often as infrequent as once a year, leaving many industrial facilities open to attacks. These risks are quite large considering these devices are found everywhere in electrical facilities, food processing, manufacturing, on-board ships, transportations and more.

“Companies operating in critical infrastructures like energy, utilities, nuclear, oil and gas know that they are not only vulnerable to the same security issues faced by most enterprises, they have the added enticement as a rich target for cyber terrorism,” stated Tony Dao, Director Information Technology, Aspect Engineering Group. “They recognize that securing their industrial control processes is not only critical to them, but to the institutions they serve. A loss would not only have repercussions throughout their economic sector but throughout the entire economy.”

The vulnerabilities begin with the use of default passwords, hard-coded encryption keys, and a lack of firmware updates, which pave the way for attackers to gain access and take control of industrial devices. Traditional perimeter-based solutions are designed to detect attacks on these devices by looking for suspicious attack behavior based on known signature patterns. SCADA supervisory systems are computers running normal Windows operating systems and are susceptible to zero day attacks, in which there are no known signatures or software patches. Several vulnerabilities also exist in the standard and proprietary protocols within Logic Controllers. Popular protocols include MODBUS (supervision and control), DNP3 (Energy and Water), BACNET (Building Automation), and IPMI (Baseboard Management Control).

Deception technology

Attivo Networks takes a different approach to detecting cyber attacks on ICS- SCADA devices. Instead of relying on signatures or known attack patterns, Attivo uses deception technology to lure the attackers to a BOTsink engagement device.  Customers have the flexibility to install their own Open Platform Communications (OPC) software while running popular protocols and PLC devices on the BOTsink solution making it indistinguishable from production SCADA devices. This provides real-time detection of BOTs and advanced persistent threats (APTs) that are conducting reconnaissance to mount their attacks on critical facility and energy networks.  Additionally, BOTsink forensics capture information including new device connections, issued commands and connection termination, enabling administrators to study the attacker’s tools, techniques, and information on infected devices that need remediation.

The Attivo SCADA solution is provided through a custom software image that runs on its BOTsink appliance or virtual machine. SCADA BOTsink deployment and management are provided through the Attivo Central Manager, which provides global central device management and threat intelligence dashboards and reporting.

“To a significant degree, the growing security problems impacting industrial control systems have originated from the fact that ICSs are increasingly less and less isolated from outside networks and systems, and ICSs are now more susceptible and vulnerable to attacks,” comments Ruggero Contu, Research Director at Gartner in his Market Trends: Industrial Control System Security, 2015 report.  “At the heart of this change is the demand to integrate enterprise IT systems to operational technology, and for remote connectivity.”

Check out this whiter paper. Dynamic Deception for Industrial Automation and Control Systems

Cyber Secure Industrial Control System Available for Purchase

Cyber Secure Industrial Control System Available for Purchase

Bedrock Automation ControllerPotentially viable start-ups are rare in the industrial automation space. Recently Russ Fadel, Rick Bullotta, and John Richardson did it with ThinkWorx an Internet of Things oriented software they sold to PTC. That was their second effort having previously sold Lighthammer to SAP.

Now we have Albert Rooyakkers, CTO and inventor, and Bob Honor, president and former VP at Rockwell Automation and GE Intelligent Platforms, releasing a new industrial control system and company—Bedrock Automation. This company was introduced to Manufacturing Connection readers last December.

This is a tough area for an entrant. I’ve watched the rise and fall of PC-based control from back in the late 90s. Rockwell Automation and Siemens are so entrenched in the market. The next tier is solid with AutomationDirect, B+R Automation, Beckhoff Automation, Mitsubishi, and Schneider Electric.

When you develop a product for a crowded market, you basically have to execute one of two strategies. Either you think that the products have reached commodity status and that you can make them better, faster, cheaper (at least the last two). Or, you totally disrupt the industry by bringing out something that does what others do better—and adds some significant new features and benefits.

Disruptive?

Bedrock Automation executives believe they have accomplished the latter. The design begins with built-in cyber security. Its patented architecture features a pin-less, electromagnetic backplane. It addresses “virtually all control applications with fewer than a dozen part numbers, reducing cyber attack vectors, cutting lifecycle costs, and simplifying engineering, commissioning and maintenance.”

“Starting from a blank sheet of paper while inventing and deploying advanced semiconductor, mechanical design, cyber computing and communication technologies has resulted in a completely new automation platform. The future is now,” said Bedrock Automation CTO and Engineering VP, Albert Rooyakkers.

Commitment to simple, elegant design is a core tenet of the system. Bedrock delivers I/O, power and communications across the pin-less electromagnetic backplane with a parallel architecture that supports ultra fast scan times regardless of I/O count. The removal of I/O pins improves reliability and increases cyber security while forming a galvanic isolation barrier for every I/O channel. This innovative backplane also allows installation of I/O modules in any orientation and location for “unprecedented” flexibility in I/O and cable management.

Secure I/O modules use layers of advanced technology to deliver software-defined I/O for universal analog, discrete, Ethernet and Fieldbus signal types. A secure power module is functionally and physically coupled to the backplane to deliver single and dual redundant cyber secure power for the control system. A secure universal controller can run virtually every application independent of size or control task: discrete, batch, continuous, or multivariable control from one device that supports as few as ten, to as many as thousands of I/O points. No longer are separate programmable logic controllers (PLC) and distributed control systems (DCS) required.

“As cyber threats to all industries grow, traditional control system vendors respond by adding cost and complexity to their legacy technology. With deep roots in both automation and semiconductors, and unburdened by legacy, Bedrock Automation has created not only the most cyber secure system available today but we have also established new benchmarks for performance, scalability and affordability,” said Bedrock Automation President, Bob Honor.

Layers of protection

Replacing pins with an electromagnetic backplane is one of many layers of cyber security protection that Bedrock Automation has implemented. Additional cyber security layers include:

  • A real time operating system with the highest safety (SIL 4) and security (EAL6+) rating of any RTOS available today
  • Cyber secure microcontrollers with encrypted keys and TRNG embedded in all system modules including the controller, power supply and I/O
  • All modules encased in anti-tamper metal that is impenetrable without metal cutting tools
  • Authentication extending throughout the supply chain, including third party software and applications

Adding so many layers of protection to a conventional DCS, SCADA RTU, PAC or PLC would add cost and complexity and degrade performance. With Bedrock, they were built in from the start.

“Brown Engineers is excited to join the Bedrock revolution. Clients in our focus markets of electric, water, and sewer utilities, are increasingly concerned about cyber security and are confident that installing Bedrock will give them peace of mind to tell their ratepayers and their board members that they are taking every precaution to protect their processes. Brown Engineers demonstrates its continued commitment to keeping clients on the forefront of technical innovation,” said Dee Brown of Brown Engineers, an industrial systems integration firm based in Little Rock, Arkansas.

Open, flexible engineering

Bedrock delivers an Integrated Development Environment (IDE) based on an open IEC 61131 software toolset that supports embedded OPC UA. The IDE enables users to develop, operate and authenticate control for a vast array of PLC, SCADA and DCS applications. Fewer components means fewer panel layouts and wiring diagrams to contend with. Software configurable I/O can be changed in the field with the click of a mouse. Ninety percent fewer I/O module types means fewer spare parts to keep and manage. Such innovations contribute to reducing overall engineering design costs by up to 33 percent.

“Bedrock is the first unique platform to enter the control market in the last 15 years. It diverges radically from the typical platforms and is superior in terms of processing power, redundancy, scalability, security and cost efficiency. We plan to use it as a point of differentiation for our business,” said Chris McLaughlin of Vertech, a Phoenix-based industrial systems integrator.

Pricing and availability

The Bedrock control system is available now in baseline configuration starting at $20,000 MSRP. A growing network of world-class system integrators and automation solution providers is available to provide local sales and support.

For more information about the Bedrock revolution, download the first white paper in the series: Revolution – Chapter One: The Backplane.

Honeywell User Group 2015

Honeywell User Group 2015

Since I have to follow the Honeywell User Group (number 40, by the way) from afar, I’m relying on tweets and any Web updates or articles I can find.

So far, Walt Boyes (@waltboyes, and Industrial Automation Insider) has posted a few things to Twitter, mostly slides from presentations that are barely legible; Aaron Hand (Automation World) has posted a few tweets; Mehul Shah (LNS Research) has a couple of tweets—interestingly saying he things as an analyst that Honeywell has all the elements of a complete IIoT solution—hmmm; and Larry O’Brien, analyst at ARC Advisory Group has published a few tweets. If they would post links to articles in the tweets, that would be interesting.

Putman Publishing (Control magazine) once again is doing a digital “show daily” and therefore is posting several articles a day and blasting out an email daily.

Walt sent a tweet about obsolescence of open systems to which software geek Andy Robinson (@Archestranaut) replied. I didn’t understand until I saw Paul Studebaker’s article online (see below). The open systems in use today are getting long in the tooth. They feature Microsoft Windows XP—evidently never getting upgrades. Now there is no Microsoft support, the world has moved on, and all these DCS interfaces based on PCs are getting ancient.

Paul Studebaker, Control magazine’s editor-in-chief, reported on the keynote presented by Vimal Kapur, Honeywell Process Solutions president.

“ ‘Since Q4 of last year, since oil prices have changed, capital investments have been reduced’, said Kapur. Investments were up about 20% in 2010 and 2011, and remained flat through 2014, but so far, 2015 is down about 12%. Operational expense spending is also off.”

Kapur described how Honeywell is helping operators meet those challenges with strategies, technologies and services.

1. Honeywell will expand the role of the distributed control system (DCS). Now, the DCS has become a focal point of all control functions, taking on the functionality of PLC, alarm, safety, power management, historian, turbine control and more. Having a single system and user leverages scarce resources, and a single platform leveraging standards does more with less.

2. Cloud computing is becoming a standard part of HPS automation projects, with a logarithmic increase in the number of virtual machines in the HPS cloud over the past two years.

3. While process safety management has always depended on detecting unsafe situations, preventing them from causing an incident or accident and protecting people from any consequences.

4. For cybersecurity, Honeywell has created a team of specialists who can do audits, identify vulnerabilities and recommend solutions. But cybersecurity requires constant monitoring, so consider using a cybersecurity dashboard, “a step toward enabling a much higher level of proactivity by identifying cyber threats before it’s too late,” Kapur said.

5. Standardization holds great promise for reducing cost and time to production by allowing pre-engineering of control systems.

6. Honeywell continues to expand and refine its field device products to offer a complete line of smart instrumentation that can be preconfigured and use the cloud for fast auto-commissioning, and that have full auto-alerts and diagnostics to enable predictive maintenance.

7. OPC UA is becoming the key to leveraging the Industrial Internet of Things (IIoT).

8. Kapur told attendees their existing investments are not fully leveraged.

9. Expansion of mobility is changing workflows and the responsibilities of individuals.

10. Honeywell is driving more outcome-based solutions in services.

Jim Montague, Control executive editor, reported on the technology keynote.

(Jim, you need to update your bio on the Control Global page)

“This is a transformative time in process controls, rivaling the open process systems introduced in the early 1990s,” said Bruce Calder, new CTO and vice president of HPS, in the “Honeywell Technology Overview and New Innovations” session on the opening day of Honeywell User Group (HUG) Americas 2015, June 22 in San Antonio, Texas. “Today, the words are cloud, big data, predictive analytics and IoT, but this situation is similar to when Honeywell pioneered and invented the DCS in the early 1970s. For instance, our Experion PKS integrates input from many sources, which is what big data and the cloud aim to do, and our Matrikon OPC solution gives us the world’s leading contender for enabling IoT in the process industries. And all these devices are producing lots more data, so the question for everyone is how to manage it.

“This is all part of the digital transformation that Honeywell has been leading for years. So Experion and our Orion interfaces enable IoT because they collect and coordinate vast amounts of data, turn it into actionable information and turn process operators into profit operators. At the same time, Honeywell enables customers to retain their intellectual property assets as they modernize and do it safely, reliably and efficiently.”

My analysis:

1. The downturn in the price of a barrel of oil whose impact we first noticed with the decline in attendance at the ARC Forum in February has really impacted Honeywell’s business.

2. Honeywell, much like all technology suppliers, addresses the buzz around Internet of Things by saying we do it—and we’ve always done it. (mostly true, by the way)

3. Otherwise, I didn’t see much new from the technology keynote—at least as it was reported so far.

4. I got some good reporting, but It’s a shame that all the media has retrenched into traditional B2B—reporting what marketing people say. You can read that for yourself on their Websites. Context, analysis, expertise are all lost right now. Maybe someone will spring up with the new way of Web reporting.

At any rate, it sounds like a good conference. About 1,200 total attendance. Even with oil in the doldrums, the vibes should be strong.

Follow this blog

Get a weekly email of all new posts.