SmartGlance Mobile Reporting Architecture and Data Security
|
|
- Stanley Day
- 8 years ago
- Views:
Transcription
1 White Paper SmartGlance Mobile Reporting Architecture and Data Security Authors: Saadi Kermani, Manager Industry Applications & Solutions, Invensys Operations Management Bimal Mehta, Director, Industry Applications Management, Invensys Operations Management Steven L. Weygandt, Portfolio Consultant Partner Products, Invensys Operations Management Snehal Shah, CEO & Founder, Sarla Analytics What s Inside: 1. Introducing SmartGlance Mobile Reports 2. Architecture 3. Wonderware Mobile Reporting Connector: Collecting and Preparing the Reporting Content for Mobile Reporting 4. The SmartGlance Business Report Generator 5. The SmartGlance Mobile Application 6. Security 7. Conclusion
2 1. Introducing SmartGlance Mobile Reports SmartGlance Mobile Reports offers managers and information workers within the manufacturing and process industries secure access to critical process data from anywhere using their existing smart phone or other mobile device. Integrated within the InFusion Enterprise Control System (ECS) platform, SmartGlance brings together data and information from a wide range of sources, providing familiar key metrics and graphical trends. Using an existing smart phone such as a Blackberry or iphone, production management and information workers can view real-time production metrics either in tabular or even in high resolution graphical form, complete with support for international languages and date and time formats. 2. Architecture SmartGlance Mobile Reports are a perfect complement to an existing ArchestrA -based plant automation solution. The provided.net Wonderware Mobile Reporting Connector can retrieve data from the Wonderware Historian, Corporate Energy Management (CEM) Application or InTouch via Wonderware HMI Reports. SmartGlance can also aggregate data from any standard Microsoft SQL- or Oracle -based server database allowing a broader range of data to be accessible by plant workers. The SmartGlance offering also has an available API to allow further extensibility by third-party developer teams who desire maximum customization and control. The SmartGlance Mobile Reporting Solution Architecture consists of three major elements: A Wonderware Mobile Reporting Connector to aggregate tag data and reporting content from available plant intelligence The SmartGlance Business Report Generator to create and serve pre-defined or custom mobile reports The SmartGlance Mobile Application for iphone, Blackberry and other supported mobile devices Page 1
3 3. Wonderware Mobile Reporting Connector: Collecting and Preparing the Reporting Content for Mobile Reporting Once a pre-defined mobile report has been selected or a custom report defined, the Wonderware Mobile Reporting Connector performs secure database queries against one or more data sets to aggregate the reporting content. The Wonderware Mobile Reporting Connector relies on the Microsoft Active Directory Security Model to define the users or groups that will have the appropriate permissions to view the controlled and managed content made available from the connector. The frequency of collecting reporting data content is configurable and can be set to user-defined periodic intervals or can be initiated on-demand All the data aggregation done by the connector is firewall friendly since it occurs behind the firewall and inside the organization Once the specified and controlled data aggregation has occurred, the resulting data set is then securely pushed to the SmartGlance Business Report Generator. 4. The SmartGlance Business Report Generator The SmartGlance Business Report Generator parses, formats, prepares and localizes reporting content for tailor made or pre-defined reports for mobile devices. The SmartGlance Business Report Generator can be accessed as either a trusted hosted solution or implemented directly on customer premises. SmartGlance provides a hosted solution also known as Software as a Service (SaaS) to alleviate many of the common burdens of hosting a solution in-house. With a hosted solution, there are no up front capital expenditures for hardware and customers benefit from a maintenance-free and scalable mobile reporting solution for a low annual subscription rate. 5. The SmartGlance Mobile Application Individual users can download the free SmartGlance App from the appropriate online application store. The native SmartGlance provides authorized users with reports specific to the user s information needs. To ensure bandwidth is kept to a minimum, the SmartGlance application only downloads the reports needed while at the same time keeping users aware that specific reports have updated content. Page 2
4 The diagram to the left illustrates the SmartGlance Mobile Reports Architecture. Data from PLCs and Field Devices connected through the ArchestrA System Platform, in addition to custom databases or application stores, provide the reporting content for the SmartGlance Reports Generator through Data Providers. Data Providers provide the mechanism to query the various data sources and collect the reporting content. The SmartGlance Configurator is used to configure reports and to associate the appropriate users to each report. The hosted Business Report Generator then manages the secure delivery of the prepared reports to authorized mobile devices for real-time review and analysis. SmartGlance Mobile Reports Architecture The diagram on the right illustrates the flow of information used in the SmartGlance Mobile Reports architecture. Valuable plant intelligence is queried against one or more data sources and the results are passed to the Wonderware Mobile Reporting Connector. The Connector, once configured using the Configurator, pushes the XML reporting content using Secure HTTP to the hosted SmartGlance Business Report Generator. The SmartGlance Business Report Generator then uses a specific mobile device APIs to securely deliver the final reports and report updates. Separately, a designated Administrative user can log into the SmartGlance Business Report Generator website to manage user and group privileges and report properties. SmartGlance Mobile Reports Architecture - Protocols Page 3
5 6. Security The SmartGlance Mobile Reporting Solution has security measures built in throughout each element of its architecture. SmartGlance uses Microsoft and standard internet technologies for its data services platform, including Microsoft SQL Server, Web Services, HTTPS and ASP.NET. Data aggregation for the reporting content is all done within the customers network and behind the firewall so it is firewall friendly. Reports leverage the Microsoft Active Directory Security Model for complete control over which reports are made available to selected users and groups. Report Data is pushed in a controlled manner from the facility to a fixed and highly secure hosted location via HTTPS using 128-bit Encryption, independently verified by Thawte of Verisign, a thirdparty Security Certificate Authority. Only authorized mobile users and devices are allowed to download reports based on the three pillars of secure connectivity authentication, authorization and encryption (see explanation graphic on the right). Secured Service The architecture of the service is twofold. The data is transmitted from your company s database to Sarla s cloud hosting service and from Sarla s cloud hosting service to your cell phone or mobile device. The service is fully secured and embraces the three pillars of secure connectivity Authentication, Authorization and Encryption. The three foundations of Secured Service: AUTHENTICATION SmartGlance achieves authentication by registering the phone hardware with your login in the service. This registration ensures that only a Registered and Authenticated phone can access the SmartGlance service. Also, only Registered and Authorized users can send data to the SmartGlance service. So, the service is protected from all sides in terms of where data comes in and where data goes out. Each communication message has builtin authentication. AUTHORIZATION Mobile-Level authorization: In addition to hardware and device authentication mentioned above, the user must be authorized to use the service. Unless a user has a password, he will not be allowed to use the service and access data. So, the user must log in from his own phone and also must have his password to access the service. This level of authorization comes in handy if the user loses his phone hardware. Whoever finds the user s phone will not be able to access this service without the user s own password. Report-Level Authorization: When the company administrator sends the corporate data to SmartGlance s hosted service, he is required to enter the addresses of authorized viewers. So, each report that comes to the host system will have a list of addresses that are authorized to view that report. So, if a user is not authorized to view a particular report, his address will not be in the report. This is the ultimate level of security. ENCRYPTION All data communication from your company s database tot he Sarla hosting service and from the Sarla hosting service to your cell phone is controlled under full encryption (HTTPS) secured site verfied by a third party, Verisign Thawte security certificate. All data is encrypted prior to transmission to ensure security from any internet programs. If a non-hosted approach is required, a secured plant-wide Wi-Fi network can be used as an alternative to cellular networks to still enable mobile reporting within the confines of the facility. This solution, although requiring a higher investment in resources and capital, would still allow the benefits of a SmartGlance Mobile Reports implementation, while keeping all data exchange and mobile reporting in a restricted space. SmartGlance s data center is state-of-the-art, with protective measures to secure the facility, including temperature control, power, fire suppression and network bandwidth. Safeguards include: 24-inch raised floor Steel Seismic Bracing 256+/- fixed positioned, security cameras Level 5 bullet-resistant walls / glass (Kevlar-lined walls) in the front entry, lobby, guard station, and shipping and receiving areas 24 x 7 x 365 on-site security guards Data Center temperature maintained at 72 degrees F +/- 2 degrees 10 Caterpillar 2000KW (2.0MW) generators VESDA Very Early Smoke Detection and Alarm system; small white air sampling tubes draw air into chambers, where lasers analyze the air for smoke content Redundant OC48s Page 4
6 7. Conclusion The SmartGlance Mobile Reporting Solution is a convenient and simple way to bring meaningful real-time plant intelligence to both production workers and executives in your organization who already use smart phones and mobile devices. The hosted solution keeps your data safe and protected and is easily scaled and modified without the need for additional infrastructure investment to support your ongoing or future information needs. Already have an iphone or ipad? Start using SmartGlance right away! Log into the Apple App Store and search for SmartGlance or navigate to: Download the app and log in as a registered user with the following credentials: Username: demo@invensys.com Password: password For more information on how the SmartGlance Reporting Solution can help you, visit Invensys Operations Management 5601 Granite Parkway III, #1000, Plano, TX Tel: (469) Fax: (469) iom.invensys.com Invensys, the Invensys logo, ArchestrA, Avantis, Eurotherm, Foxboro, IMServ, InFusion, SimSci-Esscor, Skelta, Triconex, and Wonderware are trademarks of Invensys plc, its subsidiaries or affiliates. All other brands and product names may be the trademarks or service marks of their representative owners Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, broadcasting, or by any information storage and retrieval system, without permission in writing from Invensys Systems, Inc. Rev. 04/11 PN WW-4077 Page 5
White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:
White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3.
More informationWonderware SmartGlance
Wonderware SmartGlance Features 01 SUMMARY Mobile Reporting offered by Schneider Electric provides real-time access to critical KPIs and process or operational data via popular smart phones and tablets.
More informationWonderware Intelligence
Invensys Software Datasheet Summary is now Wonderware Intelligence Wonderware Intelligence allows you to connect multiple plant /enterprise data sources to join, relate and maintain a history of your real
More informationWonderware MES Software 2012
Invensys Software Datasheet Summary Wonderware MES Software gives manufacturers complete plant visibility and control to effectively manage manufacturing and quality operations and ensure product safety
More informationEnvironmental Monitoring System (EMS) Architectures
Summary Invensys tailored EMS Environmental Monitoring System (EMS) Architectures meets demanding SCALABILITY requirements for: Invensys understands the critical nature and the challenges of a Life Sciences
More informationWhite Paper. Choosing a Wireless Implementation Strategy and Applications. What s Inside:
White Paper Choosing a Wireless Implementation Strategy and Applications Author: Sachin Gupta, Sr. Wireless Consultant What s Inside: 1. Introduction 2. Key Considerations before Selecting a Wireless Solution
More informationWonderware QI Analyst
Invensys Software Datasheet Summary is now Wonderware QI Analyst Wonderware QI Analyst software provides a complete SPC software system, combining ease of use, powerful statistical techniques, real-time
More informationInvensys Collaborative Plant Automation Maintenance. When it comes to operations performance... we make it happen.
Invensys Collaborative Plant Automation Maintenance When it comes to operations performance... we make it happen. Driving Operations Management The changing definitions of core business and other allied
More informationWonderware MES 4.0/Operations and Performance Software
Software Datasheet Summary Wonderware MES 4.0 gives manufacturers a full- Wonderware MES 4.0/Operations and Performance Software featured Manufacturing Execution System (MES) to effectively manage your
More informationArchestrA Workflow 2012 R2
Software Datasheet Summary ArchestrA Workflow brings Business Process Management to your industrial operations. ArchestrA Workflow will: Ensure consistent execution of standard work processes Analyze existing
More informationThe Smart Electricity Value Chain Real-Time Pricing and Costing
Invensys is now White Paper The Smart Electricity Value Chain Real-Time Pricing and Costing Authors: Paul Dacruz, Vice President Power, Invensys Operations Management Peter G. Martin PhD, Vice President
More informationSkelta BPM and High Availability
Skelta BPM and High Availability Introduction Companies are now adopting cloud for hosting their business process management (BPM) tools. BPM on cloud can help control costs, optimize business processes
More informationWonderware Workflow ENABLE TRUE COLLABORATION
Invensys Software Datasheet Summary Wonderware Workflow brings Business Process Management to your industrial operations. Wonderware Workflow will: Ensure consistent execution of standard work processes
More informationFOOD & BEVERAGE CONSUMER PACKAGED GOODS INDUSTRIES
FOOD & BEVERAGE CONSUMER PACKAGED GOODS INDUSTRIES FOOD & BEVERAGE - CONSUMER PACKAGED GOODS INDUSTRIES THE INVENSYS DIFFERENCE Today s Food & Beverage and Consumer Packaged Goods (CPG) manufacturers face
More informationWhite Paper. Closed-loop Energy Management Solutions with ArchestrA Workflow Software. The Invensys Solution for Corporate Energy Management
Invensys is now White Paper Closed-loop Energy Management Solutions with ArchestrA Workflow Software Authors: Bill Schiel and Sudeep Charles, Invensys Operations Management What s Inside: 1. Meeting the
More informationINVENSYS OPERATIONS MANAGEMENT: AUTOMATING THE FUTURE OF A SUSTAINABLE SAN FRANCISCO. Invensys Operations Management
Invensys Operations Management INVENSYS OPERATIONS MANAGEMENT: AUTOMATING THE FUTURE OF A SUSTAINABLE SAN FRANCISCO SAN FRANCISCO S MASSIVE WASTEWATER AND SEWER RENOVATION PROJECT UTILIZES INVENSYS OPERATIONS
More informationLOWER TOTAL COST OF OWNERSHIP & INCREASED PRODUCTIVITY
InTouch 9.0 for Terminal Services b Lower Total Cost of Ownership b Increased Productivity b Flexible Software Deployment Visualize Analyze Optimize PRODUCT HIGHLIGHTS Multiple Platforms and Devices Ease
More informationFOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW
I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new
More informationLeveraging Virtualization for Higher Business Continuity within Industrial Facilities
White Paper Leveraging Virtualization for Higher Business Continuity Author: Jim Frider, Product Marketing Manager, Invensys Operations Management What s Inside: 1. Executive Summary 2. Introduction 3.
More informationWhite Paper. Why is Alarm Management Required in Modern Plants? What s Inside:
White Paper Why is Alarm Management Required in Modern Plants? Author: Stan DeVries, Director, Energy Management Solutions, Invensys Operations Management What s Inside: 1. Introduction 2. Alarm Problems
More informationWhite Paper. Myths about Historians. What s Inside: Author: Elliott Middleton, Product Manager, Historian & Clients, Invensys Operations Management
White Paper Myths about Historians Author: Elliott Middleton, Product Manager, Historian & Clients, Invensys Operations Management What s Inside: Introduction Myth #1: Storage is so cheap that efficiency
More informationInvensys Security Compliance Platform
Data Loss Prevention DLP systems enable organizations to reduce the corporate risk of the unintentional disclosure of confidential information. These systems identify, monitor, and protect confidential
More informationInTouch Access Anywhere
InTouch Access Anywhere InTouch Access Anywhere is the latest capability of InTouch, enabling you to gain more out of your existing assets and resources. We unlock the value of your existing plant data
More informationWhite Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now
Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking
More informationWonderware Industry Solutions for Facilities Management
Wonderware Industry Solutions for Facilities Management Wonderware offers software solutions for the facilities management industry that can help you provide higher quality services to your occupants,
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationLearn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without
More informationWW HMI SCADA-08 Remote Desktop Services Best Practices
Slide 1 WW HMI SCADA-08 Remote Desktop Services Best Practices Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos
More informationWonderware Intelligence
Intelligence Turning Industrial Big Data into actionable information Intelligence Software is an Enterprise Manufacturing Intelligence (EMI) / Operational Intelligence (OI) offering which automates the
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSkynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More information2015 WW Australia Training Catalogue
2015 WW Australia Training Catalogue Wonderware Software Solutions for Real-Time Success Wonderware is the market leader in real-time operations management software. Wonderware software solutions enable
More informationActiveFactory 8.5. Data Analysis Tools for IndustrialSQL Server. Visualize, Analyze, Optimize PRODUCT HIGHLIGHTS. Real Business Value
Data Analysis Tools for IndustrialSQL Server Real Business Value Increase Asset Utilization With an image of the data, true productivity can be assessed. Empower Employees Browse to information, not just
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationTech Note 1010 SQL Server Authentication and ArchestrA Network Account Restrictions When Installing Wonderware Historian
Tech Note 1010 SQL Server Authentication and ArchestrA Network Account Restrictions When Installing Wonderware Historian All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is"
More informationMaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
More informationDream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report
Dream Report vs MS SQL Reporting 10 Key Advantages for Dream Report Page 2 of 15 Table of Contents INTRODUCTION 3 PROFESSIONAL SOFTWARE FOR NON-PROGRAMMING USERS 4 CONSIDERABLE DIFFERENCE IN ENGINEERING
More informationMaaS360 On-Premises Cloud Extender
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
More informationSoftware Update Bulletin
Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking
More informationAV TSS-05 Avantis.DSS 5.0 For Wonderware Intelligence
Slide 1 Slide 1 AV TSS-05 Avantis.DSS 5.0 For Wonderware Intelligence Functional and Technical Overview Mike Scholman Principal Customer Support Engineer 2013 Invensys. All Rights Reserved. The names,
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationWonderware Information Server Installation Guide
Wonderware Information Server Installation Guide Invensys Systems, Inc. Revision E Last Revision: March 11, 2010 Copyright All rights reserved. No part of this documentation shall be reproduced, stored
More informationLearn More Cloud Extender Requirements Cheat Sheet
Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationHow Wonderware Software Addresses the Top Challenges of the Municipal Water and Wastewater Business. Steve Garbrecht, Director of Product Marketing
How Wonderware Software Addresses the Top Challenges of the Municipal Water and Wastewater Business Steve Garbrecht, Director of Product Marketing Introduction Since 2004, the American Water Works Association
More informationWonderware Enterprise Integration Application. By Tim Sowell
Wonderware Enterprise Integration Application By Tim Sowell Highlights In today s competitive and dynamic manufacturing environment, there is a critical need to complete the manufacturing supply chain
More informationPercentage breakdown of organizations using cloud services for more than 10% of their. business. processes within a BPM project
Abstract The current proliferation of cloud based service offerings and numerous delivery models that have evolved in a relatively short span of time are re-shaping the IT landscape. What this means for
More informationFoxCTS. Change Tracking Software. Secure Information Tracking. I/A Series Server. File Changes (CTS Client Hard Drives)
I/A Series SOFTWARE Product Specifications FoxCTS Change Tracking Software PSS 21S-7A4 B3 Queries (Plant Supervisor) FoxCTS Change Tracking Software Secure Information Tracking I/A Series Server Reports
More informationWonderware edna. Real-time enterprise data historian
edna Real-time enterprise data historian edna is an enterprise real-time data management software platform. It collects, stores, displays, analyzes, and reports on operational and asset health information
More informationWonderware Historian Client Installation Guide. Invensys Systems, Inc.
Wonderware Historian Client Installation Guide Invensys Systems, Inc. Revision A Last Revision: June 15, 2010 Copyright 2010 Invensys Systems, Inc. All Rights Reserved. All rights reserved. No part of
More informationTech Note 920 Resolving Disabled ActiveFactory Reporting Website for Wonderware System Platform R2
Tech Note 920 Resolving Disabled ActiveFactory Reporting Website for Wonderware System Platform R2 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any
More informationA state-of-the-art solution that brings mobility to SCADA alarms
A state-of-the-art solution that brings mobility to SCADA alarms SCADA-Aware Mobile far exceeds the capabilities of SMS, e-mail, and pagers, and delivers alarms to the mobile device in the most reliable
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationTableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
More informationReducing Risk in Large-scale Process Automation Projects
White Paper Reducing Risk in Large-scale Process Automation Projects Author: Harald Konermann, Vice President Global Delivery & Vice President EMEA What s Inside: 1. Clear delineation of roles and responsibilities
More informationOnline backup subscription service and security overview
Online backup subscription service and security overview Abstract This White Paper is a ready reckoner for Small and Medium Enterprises (SMEs) for their data storage needs. Traditional tape-based backups
More informationIntroduction. Symbol Script Timeout Setting. Sample MES Custom Code in Symbol Script. Application Versions. Sample Code
Tech Note 1006 Managing Symbol Script Timeouts When Using WW MES API Pop-up Dialogs All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the
More information2016 Training Course Catalog
2016 Training Course Catalog Wonderware Software Solutions for Real-Time Success SM Wonderware is the market leader in real-time operations management software. Wonderware software solutions enable companies
More informationWonderware Intelligence
Software Datasheet Summary Wonderware Intelligence allows you to connect multiple plant /enterprise data sources to join, relate and maintain a history of your real time operations metrics in an open information
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationSecure Data Hosting. Your data is our top priority.
Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information
More informationabc Operations Viewer and Server Product Data MODELSOpsF,OpsS,OpsW
MODELSOpsF,OpsS,OpsW Operations Viewer and Server Product Data CONTROLS DATA MANAGEMENT PROCESS AUTOMATION Pre-engineering operator interface System wide information available Open connectivity Integrated
More informationHow To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp
INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationRaising the Bar on Scalability
by Phil Couling, Product Marketing Director, Supervisory HMI & SCADA Executive summary Automation and information systems represent a major investment for industrial businesses, both large and small. Long-term
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationTech Note 743 Configuring Reporting Services 2008 Configuration for a New Host Name in Windows 2008 R2
Tech Note 743 Configuring Reporting Services 2008 Configuration for a New Host Name in Windows 2008 R2 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationIntroduction. Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication
Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationTerminal Services for InTouch 7.1/7.11. Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION PRODUCT DATASHEET
Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION Terminal Services for InTouch 7.1/7.11 PRODUCT DATASHEET Terminal Services for InTouch 7.1/7.11 provides manufacturing users with all the benefits
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationIntroduction. Notes. Important Considerations. Application Versions. Assumptions. 8/22/13 Setting Up Historian Servers for Tier-2 Summary Replication
Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More information2014 Software Global Client Conference
WW INFO-04 Rapid Value-add For InTouch With Wonderware Historian Ray Norman NASC Agenda Historian 101 It s Important! Wonderware Historian/Client Overview InTouch Trend/HistData Review Commissioning Wonderware
More informationFeatures Security. File Versioning. Intuitive User Interface. Fast and efficient Backups
IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationSMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
More informationWW OPS-01 Consistent and Flexible Batch Execution with Wonderware InBatch
Slide 1 WW OPS-01 Consistent and Flexible Batch Execution with Wonderware InBatch Dirk Kozian Product Manager social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos /Wonderware Michael
More informationE-commerce: Competing the Advantages of a Mobile Enterprise
Addressing the Challenges of Going Mobile Mobile Data Collection Using COMMANDmobile Table of Contents Introduction... 3 Challenges of Going Mobile... 4 Existing Infrastructures... 4 Configuration Management...
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationCitrix Receiver for Enterprise Applications The technical detail
Citrix Receiver for Enterprise Applications Technical White Paper Citrix Receiver for Enterprise Applications The technical detail This technical paper details a solution that lets on-the-road personnel
More informationARC VIEW. Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions. Keywords. Summary. By Peter Reynolds
ARC VIEW OCTOBER 25, 2012 Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions By Peter Reynolds Keywords Azure, BPM, Cloud Computing, Invensys Operations Management, Historian,
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationNote: This Tech Note was formerly titled Installing Microsoft SQL Server 2008 for Wonderware Historian v10.0.
Tech Note 682 Installing Microsoft SQL Server 2008 for Wonderware Products All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationEnterprise Historian Information Security and Accessibility
Control Engineering 1999 Editors Choice Award Enterprise Historian Information Security and Accessibility ABB Automation Increase Productivity Decision Support With Enterprise Historian, you can increase
More informationOracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
More informationReal-Time Analysis and Reporting Software for Production and Performance Management
ActiveFactory 9.0 Real-Time Analysis and Reporting Software for Production and Performance Management PRODUCT HIGHLIGHTS Batch analysis tools (NEW) Improved look and feel (NEW) Historical data replay feature
More informationWonderware InBatch. Flexible batch management
Flexible batch management Wonderware InBatch is control system independent software that can be used for the most complex batching processes that require a high level of flexibility. Sophisticated equipment
More informationVantagePoint Getting Results Guide
VantagePoint Getting Results Guide FactoryTalk VantagePoint provides dashboards, trends and reports against a broad range of real time and historian data sources. To start using FactoryTalk VantagePoint
More informationSophos Mobile Control Installation prerequisites form
Sophos Mobile Control Installation prerequisites form Product version: 3 Document date: January 2013 Contents 1 About this document... 3 2 System environment... 4 3 Communication between devices and push
More informationNEXGEN Cloud Cloud Software Services and Hosting for NEXGEN Smart Meters
NEXGEN Cloud Cloud Software Services and Hosting for NEXGEN Smart Meters NEXGEN Cloud Software Automated data collection, storage, processing and delivery Core AMR/AMI applications Two way communications
More information800xA Smart Client Frequently Asked Questions
800xA Smart Client Frequently Asked Questions Table of Contents Click section title to jump to topic area General information and licensing requirements Security Applications PC and operating system requirements
More informationWhite Paper. Cyber Security. Power Industry Locks Down. What s Inside:
Invensys is now White Paper Cyber Security Authors: Ernest Rakaczky, Director of Process Control Network Security, Invensys Paul Dacruz, Vice President, Power Industry Solutions What s Inside: 1. Introduction
More informationWonderware Skelta BPM
Wonderware Skelta BPM Business Process and Workflow Management for Industrial Operations Wonderware Skelta BPM is advanced business process management and workflow software with direct integration to industrial
More informationFamly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
More informationWonderware System Integrator Program Guide. Partner Ecosystem
Wonderware System Integrator Program Guide Technical Support Experience Sales Support Expertise Training Collaboration 02 The Value of Partnering with Schneider Electric We have the Experience Schneider
More informationRevision 1.0. September 2010 2002-2010 ICS Learning Group
Revision 1.0 September 2010 2002-2010 ICS Learning Group Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims
More information