3eTI executives spotlight Secure Wireless, Crypto, and CIP Solutions | Automation.com

3eTI executives spotlight Secure Wireless, Crypto, and CIP Solutions

September 232012
Septmber 24, 2012
ISA Automation Week in Orlando, FL
3eTI (www.ultra-3eTI.com), an Ultra Electronics company, has two senior executives presenting three informative sessions based on its military-grade, ISA100 wireless mesh solutions at ISA Automation Week 2012. For over 15 years, 3eTI has developed innovative solutions built on resilient cyber-secure, wireless networking that is accredited by the U.S. Department of Defense and provide a high-level of security for ensuring data integrity. Industrial facilities are turning to 3eTI, who is the only company to offer government-validated wireless communications to extend their process control systems such as critical data protection, automated video surveillance, and secure energy management. 
Each of 3eTI’s case studies will discuss the challenges faced by the various government or military agencies, the solutions deployed by 3eTI, and how each of these solutions can be adapted for industrial use.
Thurston Brooks, vice president, Product Marketing, is on the agenda for two presentations. Brooks has 30 years of experience in military and industrial applications for the protection of critical infrastructure, has authored over 40 articles on the subject and holds two patents. He will present on the following:
  • Integrated Perimeter and Critical Infrastructure Protection (CIP) with Persistent Awareness
    ISA 2012 Automation Week Track: Security
    Tuesday, September 25, 1:30-3:00 pm, 205C
As terrorist organizations develop ever-increasing sophistication in their use of advanced technology, security officials in industry are pressured to keep ahead of the game. Terrorists are expanding their target list to attacking critical infrastructures such as power grids, industrial plants, airports, and rail transportation. This case study examines how critical SCADA systems protection offers a unique solution against terrorist attack, supporting Federal initiatives and requirements. These systems have been deployed and are proving to be a crucial asset in protection.
  • Leveraging a Secure Wireless Network for Automation and Control
    ISA 2012 Automation Week Track: Wireless
    Wednesday, September 26, 1:30-3:00 pm, 205A
Private sector facility managers are now turning to the military for guidance on deploying government-validated wireless networks in challenging environments. Wireless for industrial automation will be built on the new ISA 100.11a standards. This paper will introduce how the standards security posture must be improved to meet the needs of the federal government, and will outline the latest ISA100.11a OEM boards and capabilities in a secure Federal Information Processing Standard (FIPS) Publication 140-2 validation wireless solution.
John Suzuki, vice president, Sales and Marketing, is also presenting at ISA Automation Week for this first time this year. A 20-year industry veteran, Suzuki has experience and a strong pedigree for developing and executing sales and marketing strategies for technology-driven companies and holds a bachelor’s degree in science, electrical engineering from the University of Ottawa and a master’s degree in business administration from Duke University. He will present on the following:
  • Making “Green Grid” a Reality without Sacrificing Security
    ISA 2012 Automation Week Track: Safety/Environmental
    Wednesday, September 26, 1:30-3:00 pm, 205B
To create a Green Grid will ultimately require wireless that ensures secure real-time facilities or utilities control (802.15.4 ala ISA 110.11a) to be successful. The “Green Grid” is all about monitoring and control for energy savings, but is building an infrastructure that is insecure only opening a Pandora’s box of new threats to SCADA systems? This presentation will outline how the integration of security and condition monitoring into a single system, incorporating advanced technology for intrusion detection and condition anomaly monitoring, centralized facility usage monitoring and control, and data fusion for improved situational awareness, has resulted in a solution that leverages existing industrial-based, secure wireless and networking solutions. 
Did you Enjoy this Article?

Check out our free e-newsletters
to read more great articles.

Subscribe Now
Back to top
Posted in:
Related Portals:
ISA Automation Week