The world's most capable, rugged and secure
industrial control system...
Introducing Bedrock OSA® Remote
- Intrinsically-secure PLC and RTU control
- 10 or 20 channels of universal I/O
- Free IEC 61131-3 engineering software
- -40ºC to +80ºC temperature range
- Rugged, all-metal case 5.4 in x 8.9 in x 2.3 in
NEWS RELEASE: Bedrock Automation Demonstrates End-to-End SCADA Security at 2018 Ignition Community Conference
September 16, 2018
FOLSOM, CAL. – Sept. 17, 2018 – At this year’s Inductive Automation Ignition Community Conference (ICC), Bedrock Automation is demonstrating commercially available end-to-end SCADA security built on the cyber secure root of trust embedded in their control system. In this application, Bedrock® Open Secure Automation (OSA®) provides secure, high-performance control of industrial field devices, while also authenticating and encrypting OPC UA communications across Ignition SCADA using the Bedrock Certificate Authority (CA) and public key infrastructure (PKI).
“OPC UA enables open and secure communications across industrial devices. OPC UA’s highest level of security, however, requires authenticating all communications against a cyber secure root of trust, which is what Bedrock uniquely provides. We are pleased to continue working with Inductive Automation to help them deliver authenticated and encrypted SCADA,” said Bedrock CEO and founder Albert Rooyakkers.
At ICC, Bedrock and Inductive are demonstrating a process control application in which a Bedrock® system is sharing production data across a plant network with an Ignition Server. The Bedrock control system provides an authenticated and encrypted message signed by the cryptographic keys built into the Bedrock controller itself and validated against the Bedrock Certificate Authority. Through an exchange of electronic certificates, the Bedrock PKI verifies both the source and the integrity of all data transmitted.
In addition to OPC UA, OSA supports standards such as IEC 61131-3, MQTT and Ethernet IP, with- software selectable universal digital, discrete and analog I/O. The Bedrock® OSA infrastructure is used to authenticate hardware, firmware and software. Users interact with the cyber functions via a simple dashboard.
Bedrock Automation and Inductive Automation have now implemented this architecture at many sites and are in the process of installing at many more. “Cyber security is critical to the next generation of industrial productivity, and we have extensive programs in place to secure our customers’ applications. The industrial certificate authority that Bedrock provides augments the capability, helping to deliver the efficiency and profitability benefits of open connectivity with minimal risk of cyber intrusion,” said Don Pearson, Chief Strategy Officer at Inductive Automation.
About Bedrock Automation
Bedrock Automation, based in San Jose, California, is the maker of Bedrock® the world’s most powerful and cyber secure automation platform. This Silicon Valley company has assembled the latest technologies and talents from the automation, cyber security and semiconductor industries to build an unprecedented automation solution for industrial control based on three prime directives: simplicity, scalability and security. The result is a new platform of automation called OSA®, Open Secure Automation, with a revolutionary electromagnetic backplane architecture and deeply embedded ICS cyber security to deliver the highest levels of system performance, cyber security and reliability at the lowest life cycle cost. Build on Bedrock®!
For more information, contact Bedrock Automation at +1-781-821-0280, send an email to firstname.lastname@example.org, or visit www.bedrockautomation.com.
John Nero – Tiziani Whitmyre, email@example.com; 781-793-9380.
Robert Bergman – Bedrock Automation, firstname.lastname@example.org; 626-824-0404.
June 25, 2020
Bedrock Automation is announcing that the OT cyber security resources developed over the past few months are now available for […]
June 25, 2020
“Trust everyone — but cut the cards,” is essentially the premise of Zero Trust cyber security. Zero Trust assumes that […]