Enabling Affordable Digital Transformation In Plant Operations

 

Written by Matt Wopata

 

Uniting Ignition and Hirschmann’s OpEdge family helps your plant implement digital transformation faster so you can see ROI sooner as you capture, process and visualize critical data.

Bringing computing intelligence to the edge of an OT network unlocks new waves of advanced automation capabilities, from predictive maintenance that anticipates equipment needs to intelligent robotics that self-operate (think automated guided vehicles, for example).

 

According to MIT Technology Review, 27% of manufacturing plants have edge computing in production today, with another 56% prepared to kick off pilot projects in the next two years.

 

Bringing Edge Computing to Automation Infrastructure with OpEdge

To process large volumes of operational data in today’s connected industrial environments, Hirschmann OpEdge-8D brings edge computing capabilities to automation infrastructure.

 

Acting as a robust industrial edge gateway, it allows mission-critical applications to run at the network edge, enabling plants to quickly transform their heaps of local data into useful insights and actions. When integrated with Belden Horizon™ Console Edge Orchestration, cloud-hosted device management, application orchestration and secure remote access functionality are all possible.

 

Designed to complement OT spaces, the OpEdge-8D platform is easy to use and install, supports application deployment in a few different ways and can be used with many systems and applications.

 

How Belden and Inductive Automation Work Together

To help industrial environments take full advantage of what digital transformation has to offer, Belden partners with industry players, such as Inductive Automation, a provider of industrial automation software, to provide solutions that help industrial environments fulfill their Industry 4.0 journey.

 

Inductive Automation’s Ignition software removes the technological and economic obstacles associated with bridging production and IT so plants can turn great ideas into reality quickly. It enables the creation of virtually all kinds of industrial applications, including SCADA, IIoT, MES (machine execution systems) and more—all on one platform.

 

Uniting Ignition and Hirschmann’s OpEdge family makes affordable digital transformation and edge computing possible for industrial operations in three ways.

1. Faster Time to Value

The Belden Horizon Console streamlines the onboarding, configuration and maintenance of OT gateways, end devices (e.g., PLCs and I/O) and edge applications through three main services:

  • Belden Horizon Device Manager allows users to seamlessly onboard and configure Belden and ProSoft edge gateways.
  • Belden Horizon Edge Orchestration allows users to seamlessly deploy and manage edge applications (e.g., Ignition containers) on fleets of Hirschmann OpEdge hardware.
  • Belden Horizon Secure Remote Access (SRA) allows users to remotely access and configure both the OT end device connected to the Hirschmann gateways (e.g., PLCs and I/O) and the edge applications running on the gateways (e.g., accessing an Ignition instance running on an OpEdge).

2. Lower Maintenance Costs

The Belden Horizon Console helps users reduce two types of maintenance costs associated with IIoT deployments:

  • Troubleshooting time associated with OT end devices can be reduced by leveraging Belden Horizon Console’s SRA software, which empowers technicians to remotely connect to OT assets and applications and eliminates the need to travel onsite. The Belden Horizon Console also supports remote packet captures, allowing network engineers to diagnose pesky network-related issues.
  • Fleet management costs associated with updating OT devices and edge applications can be reduced thanks to the Belden Horizon Console’s ability to provide secure remote access to OT devices and edge applications (like Ignition) and update multiple Hirschmann OpEdge systems simultaneously.

3. Certified Performance

OpEdge-8D is one of the industry’s first certified Ignition edge devices. The certification is granted by Inductive Automation to devices that are fully compatible with Ignition Edge software and are ready to be pre-imaged with it.

 

This gives you the confidence to launch Ignition software and easily and affordably expand your system to capture, process and visualize large volumes of critical operational data at the edge.

Explore Our Ecosystem Partnerships

We partner with industry experts to connect you with the products and solutions you need—all in one place—to streamline project complexity while maximizing business value and agility for digital transformation.

 

Find the original article here

3 Steps For A Smooth Transition To Digital Transformation

Written by Jeremy Friedmar

 

It’s time to move from big data to smart data in manufacturing. How can your plant prepare? By following these three steps for digital transformation.

It’s time to shift from “big data” to “smart data.” Plants are no longer concerned about collecting information—most are knee-deep in it. Instead, they’re now questioning how to get more value from their data, whether it’s used to improve processes, reduce costs or optimize equipment efficiency.

 

But many manufacturers can’t extract valuable insights from their data because they’re still trying to figure out how to manage the sheer volume of information generated at every step in the production process, from production to quality control.

 

How can you move from overwhelm to action? By following these three steps for digital transformation.

Step 1: Develop a Solid Network Infrastructure

To support the transmission of data from point A to point B, you need to build a solid network infrastructure that can support increasing numbers of devices.

 

What characteristics make a network up to the challenge?

  • High bandwidth. Bandwidth sets the limit for how much data can flow through the network. With the number of connected devices growing every day, the result is more traffic. An increase in traffic means that more bandwidth is required.
  • Low latency. Managing latency is essential for processes that require determinism (consider robotic arms, for example). Low levels of latency help ensure that a specific action executes reliably and consistently, so you always know exactly when it will occur (in the case of a robotic arm, this means knowing when the arm will perform an expected movement).
  • Security. To protect critical processes, networks must incorporate tools and best practices that prevent and detect cybersecurity issues, such as unauthorized access, tampering or disruption.
  • Remote management. By providing remote access to the network, workers can monitor and control network activity and devices from anywhere to minimize downtime and optimize performance.

 

All these factors work together to improve uptime and keep mission-critical networks running. This minimizes disruption, maintains revenue and reduces waste.

Step 2: Make Sure Your Network Can Support Data Contextualization

Through sensors and automation systems, industrial environments are producing copious amounts of data. In order to do anything with this data, however, your network must be able to support the deployment of software that can process and contextualize it. This will help you quickly digest complex datasets to uncover patterns, establish benchmarks and predict future trends.

 

These resources can be deployed at the edge, in the cloud or both (a hybrid approach). How do you know which is right for you?

  • Edge computing helps you maintain control over your data and reduces latency by decreasing the physical distance between data sources and destinations. Some companies also choose this option for security reasons (to eliminate internet connectivity).
  • Cloud computing removes the burden of having to develop your own infrastructure for data storage and management. It also helps you easily access and manage data remotely.
  • Hybrid offers a mix of both so your plant can reap the benefits of edge computing and cloud computing while using the most effective resource for each workload.

Step 3: Follow Established Best Practices

Following best practices can help you overcome the challenges you’ll confront along your digital transformation journey. Consider interoperability among automation products, for example: Guidance is available from organizations like the NAMUR User Association of Automation Technology in Process Industries.

 

The manufacturers and integrators you partner with can always step in to provide help in this area as well, sharing what they know and have learned through their years of hands-on work.

Make Digital Transformation Your Competitive Advantage

Belden is here to offer the right guidance and help you take the right steps so you reap the benefits of innovation as you embark on your digital transformation journey.

 

Manufacturers that are efficiently digitalized will have a clear competitive advantage: They’ll be able to use data to drive differentiators like predictive maintenance, operational visibility and faster troubleshooting and diagnosis.

 

Our Customer Innovation Center experts can help you design, develop and validate solid network solutions tailored to the complexity of your unique business needs so you can unleash the power of your OT data.

 

Find the original article here

Power Up: Utilities Must Get Ready To Meet Rising Energy Demand

 

Written by Guilhermme Lisboa and Aman Sheth

 

Recent U.S. energy demand has remained stagnant—until now. Find out how power transmission and distribution companies should prepare for the surge ahead.

Over the past few decades, U.S. energy demand has remained stagnant. Upcoming decades, however, will tell a much different story.

 

In fact, the country is already seeing spikes in energy use. In 2023, for example, grid planners virtually doubled their five-year forecast for load growth (from 2.6% to 4.7%). By 2028, they predict peak demand growth of 38 GW—and this growth will continue to trend upward. The U.S. Energy Information Administration estimates that energy demand will rise to 4.112 billion kWh this year and will stretch to 4.123 billion kWh next year.

What’s Driving Higher Energy Demand?

As the economy, businesses and consumers become more electrified, they create new kinds of energy loads. Here are three examples:

Electric Vehicle

Electric vehicles (EVs) are on the move—literally and figuratively. As more EVs hit the road, they’re also making energy mobile, consuming energy from different places on the grid at different times, depending on when and where they charge. This requires dynamic, real-time control over the grid so electrons can be pushed to wherever they’re needed.

Data Centers

As data centers handle new demands ranging from artificial intelligence (AI) to virtual reality (VR), they play an increasingly critical role in our digital world—and they consume more power. According to commercial real estate advisor Newmark, U.S. data center power consumption will reach 35 GW by 2030, which is almost double the energy they consumed in 2022. As the world becomes more tech-forward, data center deployment will continue.

Industrial Processes

With record investments in U.S. manufacturing supported by key legislation like the Infrastructure Investment and Jobs Act (IIJA), the Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act and the Inflation Reduction Act (IRA), the industry is experiencing significant momentum. And many manufacturing and industrial processes require heat—which will require more energy.

 

What This All Means for Power Transmission and Distribution Companies

The time to prepare for more energy demand is now. Grid infrastructure must be ready to support double-digit load increases in relatively short order, which requires rapid planning for and construction of new power generation and transmission systems.

More Power Generation

As energy demand increases, more power generation will be needed. Because energy transition is moving consumers away from fossil fuels and toward sustainable energy, much of this power generation may happen by adding more wind farms, solar farms and other types of renewable energy sources. Traditional power plants, such as gas-fired plants, will also be needed.

More Transmission Lines

Even more challenging than increasing generation is increasing the country’s number of transmission and distribution lines, which carry energy from where it’s generated to where it’s consumed.

In California, for example, it can take 10 years or longer to build a single high-voltage transmission line. The process involves numerous stakeholders, from landowners who must agree on the line’s route to regulatory bodies that must approve and oversee their construction. Also creating challenges is the grid itself, which is undersized, is many decades old and can’t always support increased power transmission and distribution.

Remember: The grid was designed in and for an earlier era. While it has handled growing energy demands so far, it has a limited capacity to do so in the future. Increasing the flow of electrons on the grid could overload infrastructure and impact voltage and frequency stability.

More Substations

In addition to more lines, power transmission and distribution companies will also need more substations to improve grid resilience, integrate renewable sources of energy, reduce the distance between power generation and consumers and distribute energy loads evenly.

Tomorrow’s substations will need to be intelligent to handle more real-time data—from voltage, flow and current measurements to fault detection, event logging and maintenance records. These digital substations use sensors and this real-time data to support remote monitoring and control, enable digital communication and promote efficient, profitable power supply.

Because they contain their own computers, storage, networking, power, cooling and other infrastructure for given workloads, some even refer to these substations as micro data centers.

More Energy Storage

Energy sources like solar and wind aren’t always predictable. Unlike traditional power plants that generate the same amount of energy at the same times, variables like weather, system orientation and maintenance impact renewable energy generation.

Storage systems act as a warehouse to stock pile energy surpluses that are generated during sunny or windy periods—by consumers’ residential systems as well as utilities’ commercial systems—so it can be released when these resources aren’t as plentiful. This ensures a consistent supply of power and can protect against fluctuations in output or prevent voltage drops and blackouts.

New Job Roles

Remember what we said about digital substations becoming data centers? As this transformation happens, power transmission and distribution teams will need new skills.

A data center environment operates much differently than an operational technology (OT) environment (such as a traditional substation). Utility companies will need IT professionals to oversee software and hardware capabilities in complex substation environments that will include servers and other networking equipment.

In some cases, hiring may be necessary. In other cases, upskilling for existing OT team members can help fill gaps.

It’s Time to Accelerate Digitization

As society progresses and consumes more energy per capita, we all have a responsibility to generate, transmit and distribute energy in a sustainable manner.

Belden enables power transmission and distribution companies to accelerate digitization and outperform industry benchmarks in operational areas like substation automation systems, smart grids and load dispatch centers.

The experts and consultants in our Customer Innovation Centers can help you create a digital roadmap so you can start to prepare now for the surge in energy demand ahead and take advantage of the data being captured by your digital substations to improve operations.

 

Find the original article here

Beating The OT Security Skills Gap Amid Rising Cyber Threats

 

Written by Zane Blomgren

 

The cybersecurity workforce is growing, but not fast enough to fill positions or keep up with cyber threats. Hiring isn’t the answer—tech and automation are.

When it comes to the future of OT cybersecurity, the outlook is ominous.

 

There are, of course, some positives to consider. In general, the cybersecurity workforce is growing (by almost 9% in the last year alone!).

 

The bad news: It’s not growing fast enough to fill the rising number of open positions—or to combat growing numbers of cyber threats. Moody’s Analytics reports that, in the past five years, the number of publicly reported cyber incidents has doubled. If these critical roles remain unfilled, then organizations and people will face higher risk of data breaches, unplanned downtime, privacy violations and financial fraud.

 

The report also details these critical statistics:

  • Cyber incidents have “substantial, statistically significant and persistent negative impact” on company value.
  • There’s an obvious connection between cybersecurity performance and rises in reported incidents.

 

Companies say they’re already feeling the effects of the ever-shrinking workforce. In The Life and Times of Cybersecurity Professionals, published by Enterprise Strategy Group in 2023, 71% of organizations report impacts from the shortage. And 67% of surveyed cybersecurity professionals say their organizations lack cyber staff to prevent and troubleshoot cyber-threat issues.

 

Although these numbers are daunting, the situation is even more dire in OT cybersecurity. Because these professionals must have specialized expertise in specialized industrial control systems and physical infrastructure processes, they’re harder to find.

 

There’s no easy way out of this conundrum. The problem is too big and too complex to be solved through recruiting, hiring or training, because there aren’t enough qualified employees in the workforce to fill these roles. But that doesn’t mean there aren’t solutions.

For example, automation and technology can help cybersecurity professionals be more effective and efficient so they can focus on strategic work—reducing and responding to cyber threats—instead of manual tasks. Let’s take a look at how this can be done.

Streamline Security Response

Incident response isn’t simple or straightforward, due in part to the complexity and diversity of systems. OT environments are made up of a wide variety of architectures, protocols and proprietary components. This makes it difficult to create standardized incident response procedures. Today, when a cyber threat appears or an incident occurs, most security professionals must chase down how to respond.

 

The language of security is complicated, too, which prevents valuable conversations about it. Complexity makes it intimidating for others to get involved or help address issues.

 

Monitoring 24/7 is critical to simplify the complex. It ensures that network performance and access are always being evaluated—and that data is readily available. Anomalies can be reported to the right place upon detection for further investigation.

 

When a cyber threat is identified, the appropriate way to fix it should also be at the worker’s fingertips. Remediation guidance should be accessible and live close to the problem.

 

Look for vendors that offer simplified interfaces and take a general approach to security. This removes unnecessary work associated with accessing systems, reviewing logs and reports, etc. It also makes it easier for others in the organization to support the cyber team’s efforts (through participation in education that prevents accidental insider threats, for example).

Simplify System and Network Designs

When possible, look for ways to simplify and standardize network design, firewall rules, physical layout, etc. This ensures simple yet effective security.

 

Remember: “Simplified” doesn’t always mean “simple.” Instead, simplification is about removing roadblocks; breaking down processes and concepts into smaller, more digestible pieces; and making things easier to understand.

 

Some examples:

  • If you can do the job with one piece of hardware instead of three, use one (as long as it provides everything you need.) For example, Hirschmann’s Industrial HiVision network management software can help you support management of network devices, simplify device replacement and enhance network visibility.
  • Put measures in place to prevent and avoid revisiting or rework. This can mean using modern technology with proper access controls and standardized security measures, as well as clearly defining roles for IT, OT and external partners.

 

If your team doesn’t have the skills to do these things, bring in an advisor who understands industrial networking and cyber threats. That’s one way to increase manpower without having to recruit and hire more staff.

 

Integrate Tools to Eliminate Siloes

Integration helps eliminate siloes, enable holistic overviews and enable automation. Integrating cybersecurity tools results in fewer touchpoints and repetitive tasks. For example, integration with Active Directory means you don’t have to manually add users from scratch to every system.

 

It also reduces the likelihood of human error, which removes the opportunity for security risks. For example, most outages related to human error are caused by people who ignored procedures or followed inadequate procedures.

 

Tools should not only be integrated with each other, but also with the business. IT and OT can learn from one another and share best practices. For example, these groups can work together to recognize disparities, implement effective security measures tailored to each environment and apply practices holistically to protect critical infrastructure.

 

Artificial intelligence (AI) can support these efforts, helping you automate network intelligence by completing tasks like analyzing for misconfigurations and vulnerabilities, as well as system mapping to understand system-wide weaknesses and prevent incidents.

Consolidate Partnerships to Minimize Vendor Sprawl

Finally, consider consolidating vendors. This offers many benefits:

  • Fewer contracts and relationships to manage, simplifying procurement
  • Clearer communication channels that lead to improved collaboration and problem-solving
  • Easier auditing and monitoring of vendor performance
  • Simplified interoperability and integration
  • Centralized and consolidated information
  • Streamlined budgeting

 

It also helps reduce misconfigurations and incompatibility, so there’s less finger pointing between vendors and more time for strategic security practices.

Educating the Next Generation

Instead of focusing on recruiting and hiring, make sure you prioritize training the next-generation cybersecurity workforce that’s already in place, and taking steps to simplify what they do so they can respond to cyber threats. This will make the existing workforce as effective and efficient as possible.

 

Belden believes in making OT and OT cybersecurity professions as attractive as possible. If you have questions about how to create an OT environment that supports up-and-coming workers, we’re here to help.

Find the original article here

The Time to Build a Foundation for Energy Transition Is Now

Written by Guilhermme Lisboa and Aman Sheth

 

Digitalization can facilitate capabilities that will help power transmission and distribution companies support energy transition.

As the world relies on fossil fuels for energy production and generation, the effects can be far-reaching—from potential property damage to an increase in greenhouse-gas emissions.

The concept of energy transition is changing how people obtain and use energy, moving them away from fossil fuels and toward sustainable energy options.

Countries and U.S. states are moving at their own pace toward energy transition—some faster than others. Within the United States, California, for instance, has an ambitious plan to achieve 100% clean energy by 2045. By 2030, the state plans to source 60% of energy from renewables. Washington State is calling for utilities to phase out coal-fired electricity from state portfolios by 2025 and achieve 100% clean energy by 2045.

While these targets are admirable (and many would argue necessary), they’re also going to be tough to meet in many cases due to the condition and age of power transmission and distribution infrastructure.

The current U.S. grid, for example, is several decades old. It’s also designed to be unidirectional (with power flowing in one direction from the grid to the consumer). But future power demands call for a bidirectional grid (power flowing to the consumer and also back to the grid) to support:

  • Integration of renewable energy systems that allow consumers to infuse excess power generated by their solar and wind systems back into the grid
  • Decentralization that enables energy to be generated closer to where it will be used
  • Increased resilience by allowing stored energy to be tapped for backup power during outages
  • Flexibility for energy flow that moves based on demand (consider electric vehicles, for example)

 

While target dates may seem far away—2030, 2045, etc.—they aren’t as far off as they seem. As power transmission and distribution companies work toward these goals, their efforts are further complicated by increasing energy loads due to factors like:

  • New types of electricity users joining the grid, including electric vehicles and electric heat pumps
  • Electricity consumption from data centers to train and run artificial intelligence
  • Population and economic growth

This all means more transmission and distribution lines, more substations and more communications infrastructure amid this energy transition.

Digitalization: The Energy Transition Enabler

With clean-energy targets in place, power transmission and distribution companies must respond—and the only way they can do so is through digital transformation. According to the latest World Energy Investment report, grid-related investments in digital technologies was expected to reach 19% of total grid investment in 2023.

 

Energy transition requires more sophisticated grids—and refined management and control of these grids. It will also require power transmission and distribution companies to scale quickly.

Consider Brazil as an example of what can happen if your company isn’t prepared. Because of the country’s growth in clean energy and the creation of micro and mini power distributed generation, energy surpluses are being injected back into to Brazil’s grid—but its existing infrastructure isn’t equipped for it, which is causing reliability issues.

That’s where digitalization comes in. It can facilitate new capabilities to support energy transition, such as the three examples below.

1. Enabling Digital Substations

Digital substations replace analog components with digital components (think relays, meters, protection systems, etc.). Digital components are also connected through fiber optic cables.

These substations are almost like micro data centers, with infrastructure that provides power transmission and distribution companies with the capability to capture, utilize and transmit accurate, real-time data.

The digital operations, technologies, methods and processes enabled by digital substations support better visualization for system awareness and resilience. They also give utilities deeper access to their connected digital systems and the opportunity to standardize their data.

2. Supporting Operational Insights

Digital transformation enables power transmission and distribution companies to capture real-time data from their infrastructure (such as through the digital substations we mentioned above) so they can monitor and respond to:

  • Energy demand
  • The mix of energy sources being fed into the grid
  • System uptime
  • Performance issues

The ability to monitor not only operational technology (OT) data, but also data about network performance, will help utilities gain insight into network reliability to gauge problems like congestion or unauthorized access.

3. Enacting Predictive Maintenance

Through devices like sensors, smart meters and SCADA systems, utilities can monitor the condition of their systems and assets to detect operational anomalies, such as abnormal temperature readings or increased vibration.

 

These indicators may be early warning signs of failure. When deviations occur, alerts can automatically be sent to the correct teams so they can prioritize, respond to and address maintenance activities before they escalate to downtime.

 

Find the original article here

IT Security vs. OT Security: What Are The Key Differences?

When most people think about cybersecurity, IT security comes to mind—but OT security is also crucial to protect digital assets and critical infrastructure.

As IT-OT convergence continues, bridging the gap between the two technology disciplines is crucial to create a comprehensive cybersecurity strategy that protects digital assets and safeguards critical infrastructure.

OT security and IT security are both essential aspects of this strategy. Let’s explore some of the differences and similarities between the two security approaches.

 

Scope & Focus

IT Security

When most people think about cybersecurity, IT security comes to mind. It protects an organization’s information technology systems—which include networks, servers, computers, devices and business data—from malicious activity, breaches, unauthorized access and other types of cyberattacks.

The goal of IT security is to maintain data integrity while protecting an organization’s sensitive enterprise data, ensuring confidentiality and stopping unauthorized users and devices from gaining access to corporate information.

In IT, critical security threats often include data breaches, intellectual property theft and other security incidents that could lead to financial loss, reputational damage or compliance issues.

 

OT Security

As opposed to securing enterprise systems, OT security secures industrial control systems, such as supervisory control and data acquisition (SCADA) systems. It also protects the physical processes and machinery that support a plant.

The goal of OT security is to prevent cyber-related issues that can cause operational disruptions. Unplanned downtime in an industrial environment can lead to lost production, missed delivery deadlines and inefficient use of staff resources.

It also aims to prevent the compromise of safety and control systems, as well as the disruption of essential services (think water, gas and electricity) or critical infrastructure, by guarding against breaches or attacks that can create safety hazards, equipment damage, physical harm or environmental risks. These can occur when cyberattacks manipulate settings or processes, tamper with systems or cause equipment malfunction.

 

Technology and Environment

IT Security

An IT environment is usually made up of general-purpose computing devices, such as laptops, desktops, printers, servers, cloud infrastructure, mobile devices and web applications. They can be found in almost any office.

As technology and needs change, the lifecycle of these devices tends to be short. They’re often updated or replaced every few years as they become outdated, less efficient or more vulnerable to security risks. As off-the-shelf devices, they usually run on common operating systems and are straightforward to replace.

IT security helps support use of these devices and systems for safe collaboration and file-sharing, internal and external communication and outreach, accounting and financial processes.

 

OT Security

An OT environment involves specialized devices like sensors, programmable logic controllers (PLCs), distributed control systems (DCSs) and industrial machinery. Instead of being housed in offices, these rugged devices can be found right on the plant floor as they support productivity, monitoring and control.

The lifecycle of OT systems tends to be longer than the lifecycle of IT devices and systems. OT systems may be purpose-built for specific applications or environments, running on specialized software and proprietary protocols. As a result, they’re not upgraded or replaced as often as IT equipment.

Real-time operations are critical in OT environments to make sure a plant can facilitate smooth processes, adjust to changing conditions and detect anomalies or hazardous conditions—all while keeping legacy systems and proprietary protocols in mind.

 

Risk Tolerance

IT Security

IT tends to be more dynamic and faster to respond to immediate threats through regular patching, software updates and vulnerability management. These are common IT practices to reduce the risk of cyberattacks.

 

Because IT environments typically include several similar types of devices, the same patch or upgrade can often be rolled out to many machines at once. They can also be scheduled during periods of office downtime to minimize productivity impacts.

 

OT Security

On the plant floor, safety and reliability are front and center. Anything that could potentially impact operations is approached slowly and carefully. The steps often taken in IT to reduce threats, such as immediate patching and running updates, aren’t as accelerated for OT due to constraints like specialized hardware, legacy systems and long lifecycles.

Scheduling downtime to install patches or updates can disrupt critical processes that may negatively impact production and safety. Because OT prioritizes production and physical safety, some vulnerabilities may remain unpatched for extended periods of time as teams assess complexity, compatibility and possible consequences.

 

Regulatory Landscape

IT Security

Depending on the business or industry, IT environments are often subject to specific industry standards and regulations covering data protection. Consider Payment Card Industry Data Security Standard (PCI DSS), which governs security practices for handling credit card data, or the Health Insurance Portability and Accountability Act (HIPAA) for patient health information and healthcare settings. Non-compliance can result in fines and penalties.

 

OT Security

Critical industries, such as energy, manufacturing, transportation and utilities, are subject to their own OT security regulations and standards. These compliance requirements often differ from traditional IT security regulations because they prioritize safety, reliability and availability of machinery and processes, with a goal of protecting equipment and infrastructure vs. databases or software.

Frameworks like the NIST Cybersecurity Framework SP 800-82 and IEC 62443 are used in some industries for guidance on things like risk assessment, security controls, incident response and reporting obligations.

 

Skillset and Expertise

IT Security

The professionals who work in IT security require a deep understanding of things like network security, endpoint protection, application security and data security. Because they work closely with data, networks and software, their knowledge lies in addressing traditional cyber threats, such as malware, phishing and unauthorized access.

 

OT Security

OT security professionals require a deep understanding of industrial processes, SCADA systems and ICS protocols. Because they work with physical processes and industrial systems, these professionals must have expertise in securing complex physical systems and mitigating cyber risks to equipment and infrastructure.

 

Helping You Strengthen OT Security

Belden and its brands, including macmon, can help you navigate IT-OT convergence so you can experience the benefits it offers, while reducing the risks it can bring to OT security and systems.

Our broad portfolio of industrial cybersecurity solutions offers visibility to and protection from events that threaten the safety, quality and productivity of control systems.

 

Find the original article here

Written by Patrick Deruytter

To Dress or Not to Dress: Cable Combing for Category 6A Cabling

Written by Henry Franc

Cable combing or dressing creates neat, organized cables with parallel runs, while also reducing installation time. But find out how it impacts the performance of Category 6A cables.

When your cable installation is exposed and visible, such as in open, overhead cable trays or racks and cabinets, you want it to look professional and pristine. Tangled and misaligned cables are not only unsightly, but also can lead to performance issues if they’re kinked or bent.

That’s where cable combing or dressing comes in. It helps create neat, organized cables with parallel runs. It also reduces labor costs and installation time when multiple cables must be untangled and bundled during a project.

When it comes to lower grades of copper cabling, such as Category 5e and Category 6, combing has always been a regular and recommended practice during installation. But the introduction of Category 6A changed that.

 

How did Category 6A cables change combing practices?

While Category 6A cabling was being developed prior to approval in 2008, it brought with it higher levels of frequency and noise to support 500 MHz of data transmission bandwidth.

But noise sensitivity increases at higher frequencies. As bandwidth increased, so did the importance of controlling cable noise to ensure proper data transmission. First-generation 10GBASE-T systems were so sensitive to noise, in fact, that engineers had to take cell phones out of their pockets before entering lab spaces.

It was also discovered that running Category 6A cables and connectors in parallel was a main contributor to noise—a type of interference we now call “alien crosstalk.”

With lower grades of Category cable and connectors like Category 5e and Category 6, alien crosstalk wasn’t a problem—because it didn’t exist.

Alien crosstalk occurs when a signal on one cable (the “aggressor”) induces noise to the signal of an adjacent cable (the “victim”). Victim and aggressor signals impact each other the most when in parallel. This is why a cable’s copper wires are twisted into pairs: to balance the conductors of a pair and ensure that the differential signal remains equal and opposite. Alien crosstalk must be managed so it doesn’t cause performance issues.

It’s also different from near-end crosstalk (NEXT) and far-end crosstalk (FEXT), which occur within a single cable. Because NEXT and FEXT can be measured and predicted, they can be remediated through digital signal processing. But alien crosstalk is unpredictable interference that comes from outside the cable.

To address this noise-sensitivity issue, manufacturers tried all types of solutions and designs. They did everything from creating cables with very large ODs to using spacers that coiled around the four pairs in an attempt to separate and randomize interfering signals.

Still, due to this level of interference, many manufacturers advised against cable combing for Category 6A—and they still do today.

 

Cable Combing for Category 6A: yes or no?

Today, we often receive questions about cable combing. It was such a common practice with Category 5e and Category 6, but should it be done with Category 6A, given what we learned above? What do best practices dictate?

Here’s our answer: If you use Category 6A solutions from Belden, then cable combing is still fine.

These cables feature our EquiBlock™ design, which provides an equal potential barrier to minimize alien crosstalk to adjacent cables.

We also test our cables to worst-case conditions, using a combed, six-around-one configuration. Six outer cables are laid around a center cable, and cables are tied every 6 to 8 inches along the full length of the channel, bringing connectors closer together as well. Many manufacturers can’t pass six-around-one configuration with four connectors in a shortened (24 m) channel.

Belden passes this testing because its cables and connectors are designed with the best possible balance to exceed all performance characteristics and parameters specified in the Category 6A standard, including alien crosstalk, insertion loss and return loss. And our REVConnect® Connectors provide the best controlled electrical performance possible.

So go ahead—be proud of your installation work and comb your Category 6A cables from Belden if you want. In fact, we encourage it!

It’s important to note, however, that it may be problematic to comb Category 6A cables from other vendors. If another cable manufacturer advises against combing or dressing, then it’s probably wise to listen. Their Category 6A cables likely require randomization (a less tidy installation) to eliminate the potential for alien crosstalk and degraded performance.

Find the original article here

NetModule’s Success Story – Rhaetian Railway’s WiFi Solution

Written by NetModule

The Project

The Rhaetian Railway transports twelve million passengers on adventurous journeys through Graubünden every year. One third of the 385-kilometre-long route network is 1500 metres above sea level. One third is also a UNESCO World Heritage Site. Thanks to the panoramic Bernina Express and Glacier Express trains and with the Rhaetian Railway in the Albula/Bernina Landscape being named a UNESCO World Heritage, the railway enjoys a global reputation.

In 2016, onway ag (formerly WLAN-Partner AG) installed Public-WiFi at the Rhaetian Railway (RhB) station in St. Moritz as part of a pilot project. Further stations in the RhB network followed. This powerful WiFi is now also being made available to passengers on the train. The RhB already had its own infotainment solution in the Bernina and Glacier Express vehicles. In establishing an internet connection, the company sought to meet the following requirements:

  • Passengers can connect to the infotainment via WiFi and still access other activities online, such as chats, social media, etc.;
  • All requirements of the Federal Act on the Surveillance of Post and Telecommunications Traffic (SPTA) are met (e.g. identification obligation);
  • Fleets can be managed via the same solution.

 

Requirements

The following points convinced RhB that onway’s solution with NetModule hardware was the most suitable:

  • Ongoing legal protection of all Public-WiFi internet access points via the same portal and system – continuous flow of information for both trains and stations;
  • Passengers only need to register once in a six-month period using an SMS token;Security, reliability and speed
  • Central management system for monitoring and managing the entire fleet;
  • Ability to offer different usage models for passengers and company employees.of additional devices

 

Solution

On the hardware side, our certified mobile railroad routers of the NB3800 series were used at RhB for easy networking of large fleets. Our NetModule routers were chosen in this project due to the quality, stability, functionality as well as the modularity of the network components. All data traffic from the vehicle is consolidated using these vehicle routers and routed through a secure VPN tunnel via the mobile network to onway’s data centre.

The VPN tunnel terminates here. The data centre fulfils all central functions such as user authentication, filtering and monitoring user traffic, as well as limiting bandwidths and fulfilling the legal requirements according to the SPTA.

 

onway ag

Since 2004, the onway ag team has been supporting its customers in the evaluation, planning, implementation as well as operation and support of their WLAN/Network-Access-Control-Solutions and has already successfully implemented more than 100 projects. NetModule AG supports onway ag with its products in the industrial, bus and railroad sectors through its long-standing partnership.

Find the original article here

Increase Safety in Material Handling Applications

Written by Lauren Robeson Menting

While the supply crunch has eased a bit for some industries, logistics facilities remain busy hubs. Filled with autonomous mobile robots, automated guided vehicles, employees, and goods, there’s no shortage of activity and moving parts.

Keeping employees safe from these moving parts – and making sure damage isn’t done to your facility or the goods it stores, hampering production and delivery – is essential. Wireless connectivity solutions can help ensure that safety is maintained in material handling applications – read on to discover factors you should consider when selecting a wireless product for your facility.

 

Industrial vs. Commercial

You probably wouldn’t look at your home Internet service and figure the same coverage would work as well for a major facility. Likewise, you shouldn’t equip your facility with commercially available wireless radios that are synonymous more with walkie-talkies than major factories.

There are a few reasons why industrial wireless radios have the edge here:

· Robustness: Industrial radios are designed to withstand inhospitable environments. Some industrial wireless radios can also ensure adequate connectivity even in facilities that are crowded with signals.

· Integration with your PAC: A typical setup will have one primary radio that connects to your control system, with access points on mobile equipment and at other locations as your application requires. Industrial wireless radios allow for streamlined integration with your PAC, ensuring radios’ real-time data is directly transferred to your control system.

· Security: Industrial radios can provide more security than commercial models, keeping proprietary information safe and bad actors out.

 

Fast, Precise Connectivity

You also want to make sure that the wireless radios you choose can give your employees, control system, and other radios real-time information as to their rapidly changing location.

Industrial radios allow mobile equipment to send their location to the primary radio and other access points in real time, which helps ensure other equipment won’t hit it – and, most importantly, employees know where heavy equipment is at all times to increase their safety.

Pairing wireless radios and a functional safety protocol (such as CIP Safety or PROFIsafe) is an especially wise idea for applications involving mobile equipment.

 

Flexibility for the Future

Opting for a wireless radio that can be easily implemented can help keep your employees safe when new equipment is added. A streamlined installation and configuration process ensures that this work won’t fall by the wayside when adding new moving machinery.

Find the original article here

Hirschmann OpEdge-8D is Now Qualified for AWS IoT Greengrass

Written by Belden

Qualification for AWS IoT Greengrass brings new level of connectivity, communication and management of applications and workloads that run on the OpEdge-8D device.

St. Louis, Missouri – June 15, 2023 – Belden, a leading global supplier of network infrastructure and digitization solutions, is pleased to announce that the Hirschmann OpEdge-8D is now qualified for AWS IoT Greengrass. The Amazon Web Services (AWS) Device Qualification Program helps AWS Partners qualify devices that work with AWS. This, in turn, helps customers to gain confidence, choice, and selection for hardware as they explore, build, and go to market with Internet of Things (IoT) solutions. Qualified devices – like the Hirschmann OpEdge-8D – are listed in the AWS Partner Device Catalog to enable customers to quickly find hardware offered by AWS Partners for simplified project and solution integration.

AWS IoT Greengrass is an open-source edge runtime and cloud service for building, deploying, and managing device software across multiple fleets. These advancements to the Hirschmann OpEdge-8D will bring a new level of simplicity and convenience to the management of applications.

The Hirschmann OpEdge-8D is an industrial-grade edge gateway with a compact, DIN rail mount form factor that provides customers with a secure operating system (OS) and easy-to-use user interface (UI) for managing the networking and security features of the device, as well as user-defined containers and Virtual Machines (VMs). OpEdge-8D is also integrated with the Belden Horizon console for device management, secure remote access, and edge application orchestration at scale. Collectively this technology can be leveraged to connect Information Technology (IT) and Operational Technology (OT) systems to support use cases where OT data needs to be processed to derive valuable insights for the user.

Jeremy M. Friedmar, Director of Product Management for Edge Solutions at Belden Inc. expressed his enthusiasm for the certification. “Belden is thrilled to have achieved qualification for AWS IoT Greengrass on our Hirschmann OpEdge-8D as an AWS Partner,” said Friedmar. “The Hirschmann OpEdge-8D is already recognized as the premier solution for the deployment of edge computing near OT data sources, and this certification makes us a credible transporter of operational data to a critical data destination of our users.” The OpEdge-8D is suitable for use in any industrial setting, including manufacturing, energy, transportation, and machine building.

“We look forward to working with AWS as we continue strengthening our industrial solutions in our served markets,” said Friedmar.

To learn more about the Hirschmann OpEdge-8D as listed in the AWS Partner Device Catalog, visit here.

Find the original article here

Copyright © 2024 Jaycor International
Engineered by: NJIN Agency