Panel Builder System Integrator

PB 7 10 New Rockwell Logo 400July 20, 2020

Michael Szentkiralyi, Product Manager, Rockwell Automation

Today’s HMIs provide access to not only production systems, but also an increasing amount of sensitive production information. This is why it’s absolutely critical that they be secured.

A bad actor who accesses an HMI either remotely or in person could make changes to a production system that could compromise product quality or even create unsafe conditions for workers. They could also access HMI components like displays, recipes and trending information that contain intellectual property.

Of course, security threats aren’t always malicious. Well-intentioned workers can also make changes to production systems that can lead to wasted product and downtime.

To reduce the risk of these incidents happening in your production facilities, consider using modern HMI software that can help protect your people, processes and intellectual property in several ways.

Five key HMI security features

Modern HMI software offers a wide range of security features that, if used, can help strengthen your security. Key features include:

Access control: User authentication and authorization services in your HMI software can help make sure only the right people can perform the right actions at the right terminals. You can even ensure that specific production assets can be accessed only from specific terminals, based on factors like an operator’s line of sight to machinery.

Mobile security: Mobile HMIs – laptop PCs, tablets or smart phones – are increasingly being used to untether workers from fixed terminals. And mobile HMI software can deliver the same role-based access control to mobile devices as what’s possible with stationary terminals. The software allows you to restrict specific displays and interactions for certain users, for example restricting remote workers who don’t have physical access to machinery to view-only HMI access.

Electronic signatures and change confirmation: Built-in change confirmation with electronic signatures can give you greater confidence that only authorized individuals are accessing your production systems and performing certain operations or making changes. You can even require a second electronic signature from an employee in a designated “approver” user group. And if something goes wrong in production, you can review the changes made and electronic signatures logged in your system to help identify the cause of the incident.

Electronic signatures can also help you comply with standards like FDA 21 CFR Part 11 in regulated industries.

Centralized management: Modern HMI software that integrates with your existing IT systems, like Windows Active Directory, can help you more easily and securely manage users and groups in your organization.

For example, employees can use the same user credentials that they use to check their email to log into the HMI software. This can help reduce security risks like shared log-in credentials that can end up being shared on a note taped to a computer for anyone to see. Also, if an employee leaves, their log-in credentials only need to be deleted in one place.

Back-up and recovery: When you integrate modern HMI software with asset-management software, you can automatically back-up your HMI configurations. This allows you to retrieve the latest version configurations so you can quickly recover in the event of a security incident.

Integration with asset-management software also allows you to create an audit trail of operator actions. So, if an alarm goes off or a downtime incident occurs, you can review what the operators were doing to understand what happened. With proper trending and troubleshooting tools, you can even review operator actions and alarm conditions overlaid with process data for a complete look at the situation.

Find a vendor that has your security in mind

When choosing HMI software for your operations, make sure the vendor makes security a priority - not only in a product’s features, but also holistically across the product’s lifecycle.

For example, do they think about and implement security in every new feature or function they develop? Do they perform in-house testing to look for vulnerabilities in their software and work with outside security experts to do similar, third-party testing? And if a potential vulnerability is found in their products, are they transparent with customers about it?

Source

Changing Scene

  • Prev
Attend this webinar to solve your automation challenges and become more productive.   ...
Safety, efficiency, and smart design are essential when designing panels and systems.   ...
Eclipse Automation had the pleasure to host Premiere Doug Ford, Minister Victor Fedeli, and caucus ...
The HARTING Technology Group continues to briskly advance the pace of digital transformation. “The ...
Spartan Controls and AltaML are pleased to announce they have entered into a formal partnership and ...
Omron Automation, a leading provider of industrial automation solutions, congratulates Taylor Fluid ...
On July 15, EPLAN Canada will host an Added Value Webinar focused on routing, wiring and production ...
Eramosa, a North American provider of SCADA, network, cybersecurity, operational technology, and ...

RS Components Launches New Season of the DesignSpark Podcast Tackling Technology With a Comedy Twist

RS Components DesignSpark PodcastRS Components (RS), a global multi-channel provider of industrial and electronic products and solutions, has released a new series of its popular ‘DesignSpark Podcast’ which explores some of the hottest topics in technology through a mix of fun facts, exuberant stand-up, outlandish sketches and foot-tapping songs. The podcast offers educational information on each technology topic, with an entertaining comedy angle.

The new weekly podcast is co-hosted by technology expert Professor Lucy Rogers PhD – former judge on BBC’s Robot Wars and a DesignSpark blogger – alongside award-winning comedians Bec Hill and Harriet Braine.

Read More

 

Module_Divider.png

JMP Solutions and Control Station Announce Exclusive Collaboration Focused on Optimizing Manufacturing Output and Efficiency

JMP SolutionsJMP Solutions and Control Station are joining forces to provide process and control loop audit services for manufacturing environments in order to identify and optimize problematic and underperforming control loops. The partnership leverages the complementary skillsets of JMP’s expert process engineering and project management competency combined with Control Station’s proprietary process analytics platform which, will work in synergy to identify and correct PID loop related sources of inefficiency and sub-optimal performance.

Read More

 

Module_Divider.png


Proax Is Now a Distributor of HIWIN

PB-34-Proax-HIWINLogo-400.jpgProax are pleased to announce that they are now a distributor of the HIWIN product line, a leader in motion control and system technology. Their product offer includes linear guideways, ballscrews, actuators, linear motors, torque motors & rotary tables, crossed roller bearings and more. This addition comes in line with the enhanced mechanical team and product offering announced last year by Proax. This newly added line will be available to all Proax's clients throughout Canada since this is going to be implemented on a national level.

Read More

Cybersecurity and Manufacturing – Keeping Critical Information Safe From Attackers

JAE AutomationWe all know that we’re supposed to back up our data and secure our devices against attack. But too often we put it off until it’s too late. We’re busy, and we’ll get to it another day. And then, one day, we turn on our device, look for a file, and realize something is wrong. We’ve been hacked.

The thought of losing our files, pictures, and data is scary. Scale that up to an entire company and the consequences can be severe. Think about the amount of critical and sensitive information the typical manufacturing facility has access to. Sensitive customer records, design and engineering data, intellectual property, and industrial control systems for high risk manufacturing processes – there’s a lot to lose. 

Read More

 

Module_Divider.png

Phoenix Contact Control Cabinet Classroom Ep. 6: How to Determine Supplementary vs. Branch Circuit Breakers

Phoenix Contact Control CabinetSometimes it can be difficult to distinguish between types of circuit breakers, especially since in appearance they look so similar. In this episode, the focus will be on the differences between two types of circuit breakers: Branch and Supplementary.

In the Control Cabinet Classroom video series, Phoenix Contact Product Specialists Zach and Karen break down some of the basics of control cabinet design, terminology and technology to be able to better understand and utilize this powerful solution.

 

 

Read More

Product News

  • Prev
The NaviTEK IE is a tester for commissioning, preventative maintenance, and ...
R. STAHL is authorized to certify customer-specific systems for installation in hazardous ...
Maplesoft™ announced the release of MapleSim™ Insight, a new software product from Maplesoft that ...
Yokogawa Electric Corporation announces the release of new pressure and temperature sensors for the ...
Branson™ GL-300 platform increases production capability and enables faster production start-up. ...
Omron Automation Americas launches the heavy-duty HD-1500 mobile robot with an exceptionally large ...
The superior safety of Eaton’s Arrow Hart ultra grip locking devices has been enhanced with colour ...
IDEAL Safe-T-Grip® Fuse Pullers are made of molded, tough, high-impact nylon for greater strength ...
As summer heats up Rittal will be announcing two new updated LCP product lines.     ...
As of April 1, Rittal has changed the portfolio of signal pillars to the latest LED technology. ...
Kerrwil Publications Great Place to Work. Certified December 2019 - December 2020

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2020 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil