Process Engineering White Papers

1-20 of 35 < first | prev | | last >
  • Eastman Deploys ProjectWise to Drive Collaboration, Greater Efficiency, and Cost Savings

    Eastman Chemicals, one of the world’s largest chemical companies, recently decided to strengthen their information security and reliability, as well as develop a path forward to lower software maintenance costs. This Case Study shows how Eastman achieved their goals by globally standardizing on Bentley's ProjectWise software in order to replace an aging, but critical, in-house records management system. The ProjectWise solution has enabled Eastman to significantly reduce their IT costs, and is helping them achieve greater security of their vital plant information while providing a modern data-centric environment to move beyond engineering records into asset performance improvement.

    Download the white paper now.

    Bentley
    04/14/2015
  • Special Report: Protect Process Control Systems

    In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248. No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Protect Process Control Systems, we take a look at:

    • How to better protect your control system - "Defense in depth" is crucial, and new and maturing technologies may help
    • Cyber Security Challenges - learn about countermeasures to protect control systems
    • Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
    • How to mitigate security risks in legacy process control systems  - several steps can help protect against threats and extend the life of legacy equipment

    Learn how to secure your process control systems - and your plant. Download your copy of this Chemical Processing Special Report: Protect Process Control Systems now.

    10/29/2014
  • Chemical Processing Special Report: Secure plan(t)

    In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248 (Figure 1). No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Secure plan(t), we take a look at:
    • How to better protect your control system - “Defense in depth” is crucial, and new and maturing technologies may help
    • Cyber Security Challenges – learn about countermeasures to protect control systems
    • Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
    • How to mitigate security risks in legacy process control systems - several steps can help protect against threats and extend the life of legacy equipment
    Learn how to secure your process control systems – and your plant. Download your copy of this Chemical Processing Special Report: Secure plan(t) now.

    12/17/2013
  • Know Your TCO: A look at Medium Voltage VFDs

    Medium voltage VFDs are high cost, high consideration assets that greatly improve process control and efficiency in manufacturing facilities. It is vital that you and your company understand the TCO of this asset. Download the white paper for more information.

    Siemens
    10/29/2013
  • No More Risky Business With Virtual Patching

    Patching process control system software to remove security vulnerabilities is fraught with risk. System issues can be the result of installing a patch, but a system is also vulnerable without patching. Fortunately, virtual patching can improve the process and raise the system’s security at the same time.

    Honeywell
    09/21/2012
  • Cyber Security: A Perfect Storm

    As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming.

    Honeywell
    09/21/2012
  • Application Whitelisting: Extend Your Security Arsenal

    As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.

    Honeywell
    09/21/2012
  • Surviving the CFATS Site Security Plan – Tips for Inspection and Resubmission

    As the Department of Homeland Security (DHS) moves forward with the Chemical Facility Anti-Terrorism Standards (CFATS), the program continues to evolve. This white paper describes the ongoing CFATS compliance process (which is a combination of technical, procedural, and personnel security) and also provides insight regarding how to develop or revise a comprehensive Site Security Plan (SSP) and prepare for a CFATS Authorization Inspection (AI). Recommendations are relevant to SSPs for all tier levels and should be considered for a facility's initial SSP submission and/or any required SSP resubmission. Download this white paper now: Tips for Inspection and Resubmission.

    Tyco Integrated Security
    07/25/2012
  • The 7 Steps to ICS and SCADA Security

    The past two years have been a real wakeup call for the industrial automation industry. For the first time ever it has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu.

    In addition, an unprecedented number of security vulnerabilities have been exposed in industrial control products and regulatory agencies are demanding compliance to complex and confusing regulations. Cyber security has quickly become a serious issue for professionals in the process and critical infrastructure industries.

    If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.

    In order to provide you with guidance in this area, Tofino Security and exida Consulting LLC have condensed material from numerous industry standards and best practice documents. They also combined experience in assessing the security of dozens of industrial control systems.

    The result is an easy-to-follow 7-step process.

    Tofino Security and exida Consulting LLC
    02/28/2012
  • Maritime Transportation Security Act - Tips & Updates

    Remain informed about adjustments to MTSA and learn how the program continues to evolve. This paper provides regulatory updates on the current state of MTSA and information about Transportation Worker Identification Credential (TWIC). Find out about new challenges, such as harmonization with Chemical Facility Anti-Terrorism Standards (CFATS). The paper also covers the current discussion among industry and government officials regarding the differences associated with the MTSA and CFATS programs, including ways to coordinate chemical security regulations. Learn about TWIC reader pilot program updates, as well as practical tips for compliance. Download MTSA Tips & Updates Paper

    Tyco Integrated Security
    01/11/2012
  • White Paper: Ten Tips for Completing a Site Security Plan

    Working on your Site Security Plan (SSP)? The next stage in the Chemical Facility Anti-Terrorism Standards (CFATS) compliance process requires covered facilities to submit a SSP. Given the importance of the SSP, covered facilities should address a number of factors while they complete this step in the CFATS regulation. Download this complimentary whitepaper now: Ten Tips for Completing your SSP.

    Tyco Integrated Security
    03/10/2010
  • Benefits of State Based Control

    State Based Control is a plant automation control design based on the principle that all process facilities operate in recognized, definable Process States that represent a variety of normal and abnormal conditions of the process. State Based Control, implemented with the latest developments in object-based technologies, delivers direct benefits to its adopters in a variety of Operational Excellence categories. It results in productivity increases, higher asset utilization of both people and process, automated responses and recovery for abnormal conditions and provides an environment for knowledge capture directly into the control design.

    David Huffman, ABB Inc.
    05/14/2009
  • Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks

    The performance of wireless networks can change over time due to increased performance demands, changes in the radio frequency (RF) environment and changes in the physical environment. This article will explore the use of a wireless diagnostic OLE for Process Control (OPC) server technology to embed diagnostic information in human machine interfaces (HMIs), thus optimizing industrial wireless network performance.

    Jim Ralston, Wireless Sales Engineer, ProSoft Technology
    09/30/2008
  • Intelligent Rotary Control Valve

    NELES rotary control valves with Q-Trim have greater capacity than comparable globe-style linear valves with noise reduction trims widening rangeability, reducing weight and valve dimensions, and a 50% cost reduction compared to linear valves of comparable Cv. NELES rotary control valves from Metso Automation. Intelligent Reliability leads to Intelligent Results.

    06/16/2008
  • IT Security for Process Control Using Siemens SIMATIC PCS 7

    Ensuring the security of industrial control systems is hardly a new topic. The earliest users of modern control systems in power stations and chemical plants saw the need to protect access to vital control functions from unauthorized use. Similarly, in industries such as fine chemical or pharmaceutical where “the process is the product”, manufacturers have always sought to protect the secrets of their unique processes from the prying eyes of industrial spies. This white paper by ARC describes how the Siemens AG PCS7 Security Concept bundles key security measures in seveal specific areas to create a deep hierarchy of security known as “defense in depth”.

    ARC Advisory Group
    02/25/2008
  • Securing Batch Control Systems

    Batch process control security is becoming a critical concern for the process control domain, IT technology infrastructure and the business enterprise. This paper explores several key security concerns in batch control system architectures and methods for addressing these issues.

    Honeywell
    05/11/2006
  • White Paper: Internet Access in a Process Control Environment

    Industrial automation is no longer limited by the walls of a production facility. More and more automation is being handled via remote communication, whether it’s from the office or from the comfort of your own home. Today’s PLCs give you the ability to access your control system to handle such tasks as monitoring via a website to determine the condition of a machine or check other statistics.

    Wago Innovative Connections
    04/24/2006
  • Cybersecurity: Power Industry Locks Down

    The power industry is susceptible to a variety of cyber threats, which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.

    Power Engineering
    03/27/2006
1-20 of 35 < first | prev | | last >