The world's most capable, rugged and secure
industrial control system...

Introducing Bedrock OSA® Remote

  • Intrinsically-secure PLC and RTU control
  • 10 or 20 channels of universal I/O
  • Free IEC 61131-3 engineering software
  • -40ºC to +80ºC temperature range
  • Rugged, all-metal case 5.4 in x 8.9 in x 2.3 in
Learn More

Industry News

Cyber Attacks
 

Yet another virus behind the Ukrainian power grid cyberattacks has been identified – and brings considerable cause for concern.

June 14, 2017
Robert Bergman

“Industroyer” is customizable malware designed with an obvious knowledge of industrial control systems. It can be used to attack any ICS using standard industrial communication protocols – and even target particular hardware. According to ESET, its ability to persist in the system and provide valuable information for tuning-up highly configurable payloads, means attackers could adapt the malware to any environment. This makes it extremely dangerous. In fact, the Department of Energy says the U.S. now faces “imminent danger” of a cyberattack that would trigger a prolonged cascading outage that would “undermine U.S. lifeline networks, critical defense infrastructure, and much of the economy; it could also endanger the health and safety of millions of citizens.” For more on this important development, read the article here.
 
Bedrock’s intrinsic cyber protection provides the strongest defense against ICS targeted malware. If you think this means a rip and replace of your existing control system, think again! Let us show you how to deploy a Bedrock solution on top of your legacy network as an initial strong defense of your legacy industrial networks – and realize significantly better protection.
 
For more information, simply send us an email.

 
Cyber Attacks

New OT Cyber Security Training and Information Resources Now Available from Bedrock

June 25, 2020
Robert Bergman

Bedrock Automation is announcing that the OT cyber security resources developed over the past few months are now available for […]

Cyber Attacks

Cut the cards: Zero Trust in the Critical Infrastructure.

June 25, 2020
Robert Bergman

“Trust everyone — but cut the cards,”   is essentially the premise of Zero Trust cyber security. Zero Trust assumes that […]

Cyber Attacks

Trust factors in COVID-19 pandemic recovery

June 25, 2020
Robert Bergman

As countries, states and businesses begin to reopen, we do so with cause and some anticipation. Deloitte & Touche explores […]