May 2015 FDT Group Update

Similar documents
Endress+Hauser Frame Integration Mechanisms

Process automation engineering tools

Fieldbus Foundation India Marketing Committee. Fieldbus Foundation End Users Event Asset management with Foundation Fieldbus

Universal Adapters for Remote Monitoring

AUD17 Versions- und Änderungsmanagement, Audit trails und Disaster Recovery in Produktionsanlagen mit

Industrial HiVision Software

NIST Cybersecurity Framework Manufacturing Implementation

Measurement Products. Scalable device management Productivity enhancement that grows with your business

Industrial Control Systems Security Guide

FDT Stand. FDT Standard FDT/DTM. Device Management Technology based on the FDT/DTM standard

Article. Barrier-free FDT thanks to Desktop Virtualization

OPC UA vs OPC Classic

Symphony Plus Cyber security for the power and water industries

What is CFSE? What is a CFSE Endorsement?

FDT for Mobile Devices

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

Efficient remote access to machines and plants with SIMATIC

This is a preview - click here to buy the full publication

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

FDT Stand. Device Management Technology based on the FDT/DTM standard.

ISA Security Compliance Institute ISASecure IACS Certification Programs

Cloud Computing for SCADA

Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform?

System 800xA Device Management PROFIBUS and HART Configuration

Fire and Gas Solutions. Improving Safety and Business Performance

HART Device Object Type ifak System is HRT USB Version 1.1

Lab Configure IOS Firewall IDS

Using HART with asset management systems

OPC UA App development for Android

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Bellevue University Cybersecurity Programs & Courses

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

ProfessionalPLUS Station Software Suite

Information Technology Cluster

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Manufacturing Operations Management. Dennis Brandl

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Observer and OPC

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

ni.com Remote Connectivity with LabVIEW

Industrial IT Ó Melody Composer

HP Hardware Technical Support

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Industrial Communications Training

PACS A WEB-BASED APPLICATION DESIGNED TO AUTOMATE YOUR WORKFLOW.

NOS for Network Support (903)

ICT Infrastructure & Network Management

Software Release Notes - FieldConnex Diagnostic Manager

White Paper. Wireless FF HSE connection successfully setup at Shell Test Lab. Summary. Overview

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

CONCEPTS IN CYBER SECURITY

Microsoft Technologies

Intelligent Infrastructure Management System (IIMS)

OmniServer UA Interface Tutorial. A Guide to Configuring the OmniServer OPC UA Server Settings

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Kepware s Latest Communications Platform Addresses Need for Enterprise Service Bus

Owner of the content within this article is Written by Marc Grote

Introduction to Cyber Security / Information Security

Cyber Essentials Scheme

CyberSkills Management Support Initiative

Using ISA/IEC Standards to Improve Control System Security

The Next Generation of Security Leaders

Securing The Connected Enterprise

A Data Collection Revolution?

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Internet of Things at Work Plug-and-play for industrial Automation

DATAWORX32 V9.2 REDUNDANCY. An ICONICS Whitepaper

2015 Cybersecurity Awareness

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Cybersecurity Training

Impact of OPC UA and Information Modeling on Monitoring Solutions. Ron DeSerranno, Founder / CEO rdeserranno@b-scada.com

The fast track to top skills and top jobs in cyber. Guaranteed.

Safe Network Integration

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Component Based Rapid OPC Application Development Platform

Cisco IP Solution Center MPLS VPN Management 5.0

SCADA Security Training

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Best Practices for a BYOD World

The Laserfiche Rio Advantage. Automate, Optimize and Transform Business Processes. Unlimited document repositories and servers

OpEx Advantages + Asset Optimization

Data Center Manager (DCM)


General Specifications

Reducing the cost and complexity of endpoint management

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led

Role Based Access Control for Industrial Automation and Control Systems

ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS

Transcription:

May 2015 FDT Group Update Glenn B. Schulz Managing Director Copyright 2015 by the FDT Group AISBL. All rights reserved

Contents FDT Group Intro DTM Certifications Cyber Security OPC and Industry 4.0 Mobility 29/06/2015 3

29/06/2015 FDT GROUP INTRO

FDT Group Introduction FDT Group is an international, non-profit organization (AISBL) o Incorporated in March 2006 History of more than 5 year prior o Funded by membership dues More than 90 members world-wide More than 100 active volunteers Headquartered in Jodoigne, Belgium Purpose o Technically advance the FDT standard o Drive adoption of FDT standard by international standards bodies IEC 62453 ISA / ANSI 103 China GB/T o Raise awareness of the FDT standard with end users and vendors

29/06/2015 DTM CERTIFICATIONS

2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 DTM Certification Trends Independent labs carry out the test procedures o FDT office audits the labs FDT Office issues device certificates upon passing the tests Visit www.fdtgroup.org for a list of DTMs Devices Supported by Certified DTMs DTM Certificates Issued 10000 7500 5000 2500 0 600 500 400 300 200 100 0 * as of 30 April 2015

29/06/2015 CYBERSECURITY

FDT Cyber Security A new cyber security infrastructure has been established o o o Threat response Security architecture Security quality assurance Independent audit of the FDT standards will be complete in Summer 2015 o Will result in best practices documents at a minimum FDT members should name an cyber security contact Visit www.fdtgroup.org technical documents for additional information Security Quality Assurance WG Security Architecture WG FDT Cyber Security Security Incident Response WG

29/06/2015 OPC AND INDUSTRY 4.0

Creation of FDT 2 - OPC UA info model (1 / 2) Network / devices need to be configured, before they can be used. This can e.g. be done in a normal engineering tool using the DTMs. Configured network topology / device type information can be used to generate basic part of FDT 2 OPC UA information model create Engineering tool plan

Creation of FDT 2 - OPC UA info model (2 / 2) Information provided by the DTMs can be used to complete the information model o Device type information o Parameter information o IO information o Supported DTM functions Engineering tool create read

OPC UA server as FDT frame application OPC UA server can use device DTMs to access data o o o Enables access to all parameters, IOs Enables data read and write OPC server doesn t need protocol specific handling OPC Server FDT frame application OPC UA Clients browse read/write data execute function Data access interface

Next steps toward Industry 4.0 Concept combines where FDT and OPC fits best OPC provides uniform interface for many different client applications FDT provides network / device configuration and access to devices FDT concepts enable unification of system engineering, configuration & diagnosis in Industry 4.0 FDT supports Industry 4.0 devices, but is also able to build a bridge to Industry 3.0 networks and devices Required FDT extensions are FDT OPC UA protocol annex specification FDT / AutomationML data mapping annex specification

29/06/2015 MOBILITY

FDT Mobility Survey - Overview FDT Group is sponsoring a survey being conducted to better understand the market requirements of using the FDT standard in a mobile setting Respondents > 250 http://mobilitysurvey.fdtgroup.org Copyright 2014 FDT Group AISBL. All rights reserved. 16

FDT Mobility Study When doing device management with the FDT Standard, how often do you perform: o device installation and configuration? o device monitoring? o do alarm management and diagnostics? o do you do calibration and maintenance? Are there situations or tasks for which a mobile solution for device management would be useful? In what context might you work with a mobile solution? Will you have network connectivity (e.g. 3G/4G/WiFi) in your mobile application context? Does your mobile solution need to work in a hazardous environment? What tasks might you perform with such a mobile solution? Would you expect that the mobile application reacts to the proximity to a machine or device? Copyright 2014 FDT Group AISBL. All rights reserved. 17

FDT Mobility Study A smartphone or tablet has many capabilities and sensors that traditional computers do not have. Which of these could be useful with mobile device management? If some of these terms are unknown to you, leave the corresponding check boxes unchecked. How many Device Type Managers (DTMs) should be included in a single application on the mobile device? How important is a reliable synchronization across devices (desktop, mobile devices) for you? Do you have concerns regarding the security of a mobile device management? Which aspects should determine who has access to certain functions in the mobile application? Which mobile devices should be supported by the FDT technology? Which mobile operating systems should be supported? Would you expect that you can use your personal mobile device for device management? Copyright 2014 FDT Group AISBL. All rights reserved. 18

29/06/2015 CLOSING

FDT Group Members

Stay connected www.fdtgroup.o rg 29/06/2015 21