Everyone knows it’s all about the cloud—and the IIoT gateway is the critical component to getting all your real-world data to that cloud. And it matters. Without it, there’s no: big data, cloud computing, advanced analytics, AI, machine learning, and the list goes on…
At Opto 22, we have a 50 year history of helping you collect and store real-world data. We know the cloud is where you want that data. So when we designed our sleek, rugged, industrial-grade I/O that lasts a lifetime, we also made them IIoT gateways.
Read More
Topics:
IIoT,
groov EPIC,
cybersecurity,
groov RIO,
cloud computing
Follow along with the 4th installment of the groov Manage video and blog series as we focus on the Security button in the groov Manage menu.
This week brings you the fourth installment of walking through the groov Manage menu options found on a groov EPIC. In case you missed it, you might want to catch up on the previous three menu options we've covered so far: Accounts, Network, and System. Now, you'll be ready to dive into the Security features.
Watch groov Manage: Security.
Read More
Topics:
Videos,
groov EPIC,
groov Manage,
cybersecurity,
EPIC Security,
groov Manage series
From overcoming security and supply chain interruptions, to learning a "new perspective" with groov, watch as Opto 22 shares tips and insight in two recent online events.
With today's busy schedules and so many online discussions available in the industrial automation space, it's easy to miss some learning opportunities. If you missed them, here are two recent webinars you can watch now.
Read More
Topics:
Webinars,
MQTT,
groov EPIC,
cybersecurity,
groov RIO,
cloud computing
Can you maintain your business in the face of supply chain challenges and ransomware attacks? Join us for a resilience webinar.
You know it’s critical for manufacturers to be able to maintain business continuity in the face of operational challenges like these. When working with today's cloud and edge computing technologies, operational resilience is vital.
Join us as Opto 22’s Rene Gamero and tech partner 4IR Solutions CTO Joe Dolivo discuss this important topic in a new webinar presentation live streaming on March 30.
In this joint webinar, Joe and Rene will discuss common obstacles to achieving operational resilience and provide a live solution demo featuring FactoryStack and groov EPIC that demonstrates overcoming security, connectivity, and reliability challenges.
Read More
Topics:
Webinars,
groov EPIC,
cybersecurity,
OptoPartner,
edge computing,
cloud computing
Tune in March 30th as Flexware Innovation livestreams an IIoT discussion with Opto 22's Benson Hougland.
Active members of Inductive Automation's Ignition Community gain several benefits, and working with other cutting-edge technology companies is just one of them.
Meet Flexware Innovation—whose mission is to help manufacturers with their digital transformation. Their highly skilled engineers help customers solve real business problems with software development, automation engineering, manufacturing systems integration, and IoT devices.
And they've invited Opto 22's Benson Hougland to be a guest on the Flexware Twitch live stream platform this month.
Read More
Topics:
Webinars,
groov EPIC,
cybersecurity,
Ignition,
OT data
See how system integrators in water/wastewater, natural gas production, and manufacturing leveraged MQTT and industrial edge devices to securely access and use key data.
If your goal is to get useful data from field devices and legacy systems, you’ve probably found that putting together an IIoT system is complicated, requiring many OT and IT devices, software, and protocols.
But these 3 real-world case studies show how two tools—the MQTT communications protocol and industrial edge devices—can simplify your IIoT project.
Read More
Topics:
IIoT,
MQTT,
cybersecurity,
MQTT implementation,
edge computing,
control engineering
Join Opto 22 and see groov EPIC in action at the one day ENTELEC Fall Seminar for the energy industry.
If your schedule allows you to be in the area of Odessa, Texas October 6th, you'll want to include the annual ENTELEC Fall Seminar in your plans. ENTELEC is a user association focusing on the convergence of telecom and IT including digitization, IIoT, automation, cyber security, AI, cloud and edge computing, specific to petroleum, natural gas, pipeline, and electric utility companies.
Their Fall Seminar is a one day conference designed to fit your schedule and priced to fit any budget. It's a well planned day offering new technology demos, industry training programs and networking opportunities, especially focused on the Energy and Oil & Gas industries.
Read More
Topics:
Energy management,
Events & conferences,
Training,
groov EPIC,
cybersecurity,
edge computing,
oil and gas
Inductive Automation's Kevin McClusky suggests a different approach to make your industrial systems safe and secure in this month's featured guest blog.
What would it take to break into Fort Knox? As one of the most secure locations on the planet, it wouldn’t be easy. However, someone with the right amount of time, planning, and determination may be able to find a way.
The same is true for most industrial systems. So, how to protect what’s inside? Strategies that may work in the physical world—thicker walls or taller fences—don’t translate to digital systems. The tools of the trade here are a variety of high-tech solutions such as firewalls, SIEMs, IDS’s, and IPS’s. These are tools mainly to monitor network traffic and control the flow, and provide early alerts if there’s unusual activity.
However, what if we threw out all of those traditional tools and took a different approach?
Read More
Topics:
Security,
cybersecurity,
Ignition,
Inductive Automation,
Art of the Possible
Part 2 of our interview with Industrial Cybersecurity Pulse addresses edge communications and reducing network complexity.
Last week in the OptoBlog, we shared a recent interview where Josh Eastburn had a discussion with ICS Pulse's Gary Cohen about using industrial devices on the edge of your networks and their effect on cybersecurity.
Their conversation continues in Part 2 of this Expert Interview series and covers:
- OT data risks
- Different OT communication protocol models
- How MQTT addresses security threats
- Reducing network complexity
Read More
Topics:
IIoT,
cybersecurity,
edge computing,
Expert Interview series
A discussion with Industrial Cybersecurity Pulse about edge devices and cybersecurity
Industry 4.0 and edge computing concepts are becoming more commonplace in a variety of industries. Data democratization is key for companies taking on their digital transformations. But along with these advancements come extra security risks.
How can you address cybersecurity threats for these devices on the edge of your networks? We have some thoughts on that, and Josh Eastburn shared some insights when he recently sat down with Gary Cohen, senior editor at Industrial Cybersecurity Pulse.
Read More
Topics:
IIoT,
cybersecurity,
edge computing,
Expert Interview series