The world's most capable, rugged and secure
industrial control system...
Introducing Bedrock OSA® Remote
- Intrinsically-secure PLC and RTU control
- 10 or 20 channels of universal I/O
- Free IEC 61131-3 engineering software
- -40ºC to +80ºC temperature range
- Rugged, all-metal case 5.4 in x 8.9 in x 2.3 in
NEWS RELEASE: Temblor Petroleum Implements Bedrock Open Secure Automation for Cloud-based Well Head Monitoring and Control
January 29, 2019
San Jose, Calif. – January 29, 2019 – Bedrock Automation announced today that Temblor Petroleum is implementing Bedrock® Open Secure Automation (OSA®) for a unique cloud-based well head control and data-sharing application. The application enables Temblor to monitor and operate well heads remotely, providing secure real-time production data while minimizing the requirements for onsite operators.
“We really wanted to optimize technology to impact our operations, field surveillance and have real-time data. This system has allowed us to achieve that from any location, office or field with access to the internet,” said Temblor President Mike Thorsen.
Bedrock Open Secure Automation provides the control infrastructure that is now automating operation of two well heads but will also scale to operate more wells in the future. It controls tank levels, pumps, compressors, separators, duct valves, and other devices, and is cyber hardened by the Bedrock Cybershield security designed into to its electronics.
In addition to Bedrock OSA technology, the project involves communications technology and system design services from Bakersfield, California-based Tyrion Integration. Tyrion is providing the cloud connectivity that enables sharing of the data collected from the Bedrock controls across Tyrion’s Nucleus communication gateway. This enables operators to monitor trending, alarming and analysis in the cloud. It receives operating data from a Bedrock OPC UA server via Ethernet and communicates it to a cloud-based infrastructure via cellular and message queuing telemetry transport (MQTT).
“We browse field operating data through OPC UA and then expose it to the cloud. The Bedrock secure IEC 61131-compliant IDE enables us to take advantage of the advanced encryption and authentication options of OPC UA. We use the Bedrock IDE to set data tags to control access with encryption and authentication handshakes so seamlessly that users don’t even realize that they are engaging in such deep cyber security protection,” said Mark Goehring, owner of Tyrion Integration.
Goerhing estimates that implementing the system using Bedrock Open Secure Automation saved 50% over any alternative approach, while also setting Temblor up for continued life cycle cost savings, operational effectiveness, and improved service to clients.
For more details:
- Attend Mike Thorsen’s presentation at ARC Industry Forum, Wednesday, February 6, 4:00 p.m. at the Renaissance Orlando Sea World hotel.
- Download the case history by clicking here.
About Bedrock Automation
Bedrock Automation, based in San Jose, California, is the maker of Bedrock™, the world’s most powerful cyber secure open automation platform. From Silicon Valley, Bedrock Automation has assembled the latest technologies and talents in both the automation and semiconductor industries to build an unprecedented automation solution for industrial control based on three prime directives: Simplicity, Scalability, and Security. The result is an open yet secure system with a revolutionary electromagnetic backplane architecture and deeply embedded cyber security, which delivers the highest levels of system performance, industrial cyber security, and reliability at the lowest cost of ownership.
For more information, contact Bedrock Automation at +1-781-821-0280, send an email to email@example.com, or visit www.bedrockautomation.com.
John Nero – Tiziani Whitmyre, firstname.lastname@example.org; 781-793-9380.
Robert Bergman – Bedrock Automation, email@example.com; 626-824-0404.
June 25, 2020
Bedrock Automation is announcing that the OT cyber security resources developed over the past few months are now available for […]
June 25, 2020
“Trust everyone — but cut the cards,” is essentially the premise of Zero Trust cyber security. Zero Trust assumes that […]