Making the Factory Floor Smarter with IoT and VxWorks

Similar documents
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS

Improving Security in Embedded Systems Felix Baum, Product Line Manager

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

WIND RIVER NETWORKING SOLUTIONS

IoT Market: Three Classes of Devices

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications

ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

Real-Time Systems and Intel take industrial embedded systems to the next level

Continuous protection to reduce risk and maintain production availability

Security: The Key to Affordable Unmanned Aircraft Systems

Securing Edge Devices

Thrive in today's digital economy

Thrive in today's digital economy

Managing & Accelerating Innovation with Open Source at the Edge

Using Cisco security services for IoT open platform development

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Cybersecurity for IoT to Nuclear

SECURING DEVICES IN THE INTERNET OF THINGS

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

10 Steps to Virtualization

INTERNET OF THINGS KONTRON

Reinvent Your 2013 Security Management Strategy

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Securing Devices in the Internet of Things

SECURING DEVICES IN THE INTERNET OF THINGS

THE INTERNET OF THINGS FOR DEFENSE

See What You ve Been Missing

VXWORKS PROSPECTUS VXWORKS UNIVERSITY OF SKILLS

RED HAT INSIGHTS. Security & Proactive Response with Insights

Intelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018

Five Steps to Improving Security in Embedded Systems

Fog Computing: Keystone of Industry 4.0 and Relevant to Innovation in the Textile Industry

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS

Cisco Connected Factory Accelerator Bundles

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

Medigate and Palo Alto Networks Integration

Cyber Security Technologies

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

K12 Cybersecurity Roadmap

WIND RIVER OVERVIEW Wind River. All Rights Reserved.

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Internet of Things. Tanja Hess Consulting Systems Engineer 2nd June 2016

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

Michael Gaudlitz, Field Application Engineer. Bringing Intelligence into the cloud

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

TOMORROW Starts Here Cisco and/or its affiliates. All rights reserved. 1

HOW TO MAKE THE CASE TO MANAGEMENT: PAYING FOR OPEN SOURCE

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

ABB Process Automation, September 2014

FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT

Be effective in protecting against the cybercrime

RSA IT Security Risk Management

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Automating, Securing, and Managing Cox Automotive's (AutoTrader) Big Data Infrastructure

One Hospital s Cybersecurity Journey

Cybersecurity and Commercial Aviation

Industrial Network Trends & Technologies

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Secure Development Lifecycle

eplus Managed Services eplus. Where Technology Means More.

Symantec Advanced Threat Protection: Endpoint

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of

IoT Edge within the IoT Framework

Nebraska CERT Conference

Applying MILS to multicore avionics systems

NEXCOM IoT Controller Solution Brings Intelligence to Manufacturing

Enterprise Linux vs. Embedded Linux

Telit Intelligent Modules Harness the Power of Intel Atom x3 Processors

Using a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager

meet at the edge Introducing VYKON Edge Controller 10 edge

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

Internet of Things Towards a more collaborative model

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

White Paper. Connected Car Brings Intelligence to Transportation

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS

Safety & Cybersecurity of embedded softwares in product and process

THE ACCENTURE CYBER DEFENSE SOLUTION

FOR IMMEDIATE RELEASE

OCTOBER 2016 TELIT WHITE PAPER

THE CYBERX PLATFORM: PROTECT YOUR PEOPLE, PRODUCTION, AND PROFITS HIGHLIGHTS SOLUTION BRIEF

Comodo Certificate Manager

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

TD01 - Enabling Digital Transformation Through The Connected Enterprise

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

Uptime and Proactive Support Services

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Managed Security Services - Endpoint Managed Security on Cloud

White Paper. View cyber and mission-critical data in one dashboard

Everything visible. Everything secure.

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Transcription:

Making the Factory Floor Smarter with IoT and VxWorks A Case Study 2017 WIND RIVER. ALL RIGHTS RESERVED.

AGENDA Factory of the Future OMRON Corporation 2 2017 WIND RIVER. ALL RIGHTS RESERVED.

DIGITAL TRANSFORMATION Business Impact Data-enabled intelligent systems Lifecycle costs Safety whilst enabling connectivity Maintaining security Industrial IoT Software-Defined Functional Safety Cybersecurity 3 2017 WIND RIVER. ALL RIGHTS RESERVED.

THE INDUSTRIAL INTERNET OF THINGS Driving digital business transformation Enables optimization at scale Services based on machine data enable Reduced operational expenditure Efficiency of resource usage Flexibility of manufacturing CLOUD FOG 4 2017 WIND RIVER. ALL RIGHTS RESERVED.

INDUSTRIAL INTERNET OF THINGS Factory of the Future CLOUD FOG 5 2017 WIND RIVER. ALL RIGHTS RESERVED.

WIND RIVER DELIVERING SUCCESS OMRON CORPORATION

OMRON CORPORATION Company Introduction Headquarters : Kyoto, Japan Established : 1933 Capital : JPY 64 billion Industrial Automation Business Unit Serves 110 countries and regions Controllers, sensors, switches, relays, and safety equipment Vision: Bringing innovation to manufacturing through automation and enriching the lives of people around the world. 7 2017 WIND RIVER. ALL RIGHTS RESERVED.

OMRON INDUSTRIAL PC PLATFORM Innovating manufacturing through IoT utilization and high-speed, highprecision automation PLC Controls manufacturing systems Connects to OT and IT Systems Ethernet & EtherCAT Runs complex custom applications Additionally Aggregates data from devices Meets high quality standards Achieves long term reliability 8 2017 WIND RIVER. ALL RIGHTS RESERVED.

OMRON IPC RTOS CONTROLLER Industrial PC (IPC) PC Architecture Meets strict quality standards Equipped with Real Time OS Operating System Wind River VxWorks Wind River Linux Flexible programming environment 9 2017 WIND RIVER. ALL RIGHTS RESERVED.

WIND RIVER OPERATING SYSTEM SOLUTIONS For OMRON IPC RTOS Controller VxWorks Deterministic real-time response Modularity and scalability Connectivity, safety, and security Wind River Linux Yocto Project open source Linux Flexibility and scalability Connectivity and security VxWorks Wind River Linux 10 2017 WIND RIVER. ALL RIGHTS RESERVED.

Aerospace Defense Networks Industrial Energy Automotive Retail VxWorks Powering 2 Billion+ Devices Trusted by 9,000+ Companies Used by 40,000+ Developers Consumer Medical Transportation 11 2017 WIND RIVER. ALL RIGHTS RESERVED.

FLEXIBLE DEVELOPMENT ENVIRONMENT VxWorks Software Development Kit: VxSDK Device VxSDK is a VxWorks software development kit for a device, enabling system integrators to write custom applications 12 2017 WIND RIVER. ALL RIGHTS RESERVED.

Wind River Linux helps you tap the full potential of open source development for your commercial applications. Wind River Linux provides world-class support, maintenance, and risk mitigation services for open source software, driving technological and process quality and peace of mind. Wind River Linux Is the Leader in the Embedded Linux Market* *Source: VDC Research Group 4 2017 WIND RIVER. ALL RIGHTS RESERVED.

SECURITY DEVELOPMENT PROCESS Wind River processes are founded in embedded SAFETY CRITICAL Flight safety (DO-178C Level A) Industrial (IEC 61508) SECURITY Common Criteria EAL 4+ for Linux Process is tailored to product needs: Open Source Real-time Safety critical Etc. Management Process Plan Phase Wind River Product Development Lifecycle (PDLC) Framework Propose Phase Define Phase Dev/Test Launch Sustain Development Process Assessment & Requirements Architecture Design Implement Deploy 14 2017 WIND RIVER. ALL RIGHTS RESERVED.

PRODUCT SECURITY INCIDENT RESPONSE PROCESS Wind River actively monitors for vulnerabilities applicable to supported products Assessment / Prioritization Assess, prioritize vulnerabilities and responds with an initial acknowledgement within 1 day of receipt (for External source) Prioritization: High, Medium, Low, Not Susceptible Notification Proactive notifications for vulnerabilities that DO apply at OLS and external party (if applicable) Regular consolidated alerts for vulnerabilities that DO NOT affect product at OLS and external party (if applicable) Public disclosure restrictions apply to specific vulnerabilities (e.g. CERT) Remediation Posting & notification of patch / resolution on OLS and external party CERT PRODUCT SECURITY RESPONSE TEAM DOES NOT AFFECT PRODUCT CONSOLIDATED OLS NOTIFICATION CUSTOMERS EXTERNAL APPLICABLE TO PRODUCT PROACTIVE OLS NOTIFICATION DEFECT FILED SECURITY PATCH + OLS NOTIFICATION 15 2017 WIND RIVER. ALL RIGHTS RESERVED.

LINUX SECURITY VULNERABILITY RESPONSE EXAMPLE: STACK CLASH Embargoed vulnerability Page live one day after the vulnerability announcement Links to updates and remediation patches for affected products on KL CVE data base windriver.com page 16 2017 WIND RIVER. ALL RIGHTS RESERVED.

DELIVERING SUCCESS: OMRON CORPORATION Wind River Impact VxWorks and Linux Fast, Highly Accurate Automation Technology Flexible Development Environment Enhanced Security We can help our customers connect systems on networks inside the factory and optimise operations based on data they generate to increase productivity Toshiki Natsui Manager OMRON Controller PMG 17 2017 WIND RIVER. ALL RIGHTS RESERVED.

18 2017 WIND RIVER. ALL RIGHTS RESERVED.