Data capture and ingestion

netinDS_Alarmas

In the factory


We connect and read all the processes and infrastructures to extract the defined data from them and be able to ingest, display and exploit them later. Here we find the EDGE nodes, which will help us reduce costs in our digitization process.

ES

Data Factory

From datato business decisions

Sorry... Data Factory is only available for screens with a resolution greater than 1024px.

Cybersecurity Master Plan

Cybersecurity strategies are established based on solutions and measures that follow the recommendations and standards of the most comprehensive regulations in relation to this field.

The Master Plan consists of drawing up a long-term plan (generally less than 5 years) to increase the level of cybersecurity at the facilities. 

This plan is made up of a series of procedures and actions that are based on the cybersecurity regulations that apply to the customers. 

This plan must set the order and times of implementation of each of these actions, so that they do not imply a detriment in the usual activity of the industrial process.

It establishes in matters of information security forcritical infrastructures:

- Basic principles.
- Minimum requirements.
- Categorization of systems.
- Security measures.

It deals with specific security actions for industrial automation and control systems. 

It divides the industry into different roles, each of which follows a focus: operator, integrators or manufacturers.

Audit

Network Physical Assessment

  • Wiring check.
  • Identification of the labeling of all the elements.
  • Check cable passages.

Security review

  • Review of current network typology.
  • Identification of plant segmentation.
  • Review of equipment and server configurations.

Asset Classification

We value the assets according to the level of protection needed, being more or less critical and the risk they have of being attacked.

Layer structure

Applying the Purdue Model and using asset classification, we create layers of security by bringing together assets of the same level.

Network segmentation

Zones and ducts are generated based on the Purdue Model toisolate the elements according to the necessary security level.

Backup management

Carrying out regular backups of the system guarantees us abackup of the information in case of being attacked and needing to restore theinfrastructure.

Once we establish the cybersecurity strategy, we move on tothe digitization of the industrial process, expanding these secure methodologies throughout the growth of the infrastructure. 

Do you want to see how?

Start to digitize

Data capture and ingestion

To digitize an installation, the first thing that is needed is the data. However, it is not enough to have the data; We must also ensure that they are accurate, useful and that we can transform and manage them efficiently, in order to improve the efficiency of the processes.

The first step in data capture is to know what types of data I need and can get from the equipment to define what level of depth I have to go to extract it.

  • Production status.
  • Network status.
  • Access control.
  • Actividad de usuarios.
  • Security events.
  • Network traffic.
  • Assets status.
  • ...

Data flow strategy

Streaming. The information is sent in real time. It's a process that is continually in succession, so it will bring with it constant network load and higher cost in cloud environments.

Batch (Lots). The information is sent in batches, each time a certain event is reached (volume of data, a period of time...). This method relaxes the network, and can lead to great cost savings in cloud systems.

Edge Computing

Edge Systems are, and must be, much more than the way in which field data is collected, it is the border between IT systems and OT devices to have full control of the data at all times.

Fast deployments

Implement updates to systems and deploy them on new infrastructures quickly and effectively, saving resources.

IT/OT convergence

Decide which machine or device data is processed locally and which is optionally transferred to the cloud, lightening the load on IT infrastructure.

AI in Field EDGE

Implement Machine Learning models and algorithms on EDGE equipment, and replicate them in the rest of the facilities for business decision-making.

Secure architectures

It complies with safety regulations (IEC62443) including EDGEs in network zones and ducts, favoring control of production environments.

Scalability

Easy integration of new systems and devices in the architectures for a continuous and controlled growth of the business.

Low latency

Improvement of industrial network communications, reducing the amount of data transferred to the cloud for exploitation.

Security and control

Increased data security against cyberattacks by minimizing the sending of data to other external destinations.

Cost reduction

Less investment in the development of future industrial projects, ensuring the implementation of disruptive technologies.

Continuing operations

Autonomous deployments and executions, even when disconnected, achieving more efficient processes.

Easy maintenance

Maintenance without displacements, reducing start-up times, and facilitating "reversing".