News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

E Tech Group Announces Critical Achievement of a Certified Information Systems Security Professional (CISSP)

E Tech Group has attained Certified Information Systems Security Professional status to help intensify and strengthen their delivery of sophisticated cybersecurity programs to protect manufacturers and industrial clients integrating OT assets and systems to front office IT systems. West Chester, OH – E Tech Group, a leader in providing high-quality automation, control and engineering services for industrial clients and Gold Certified Rockwell Automation Partner, announced today that they completed and earned the Certified Information Systems Security Professional (CISSP) status. CISSP certification is a globally accepted standard that validates IT security professionals’ skills and experience in handling and executing security plans. As manufacturing and industrial companies progress with the adoption of more industry 4.0 solutions, the need to integrate IT into traditionally siloed operational technology (OT) securely is imperative. E Tech Group provides cybersecurity services with expertise in both IT and OT industrial control systems (ICS). “This achievement aligns with our firm’s ‘beyond automation and control’ vision, and demonstrates our focus on delivering sophisticated yet practical solutions to clients,” said Nick Hasselbeck, Vice President of Cybersecurity at E Tech Group. “This accomplishment elevates E Tech Group’s professional profile and strengthens our team’s ability to provide nuanced sophisticated security solutions to our clients.” CISSP professionals have proven they are able to effectively design, implement, and manage a best-in-class cybersecurity program. To earn this certification, a professional must possess five or more years of work experience, pass a written exam, maintain good standing within the cybersecurity industry, hold membership with ISC2, and commit to adhering to the ISC2 Code of Ethics and privacy policy. “Earning this certification brings a new level of expertise and authority to showcase our cybersecurity and networking capabilities,” said Kevin Romer, Solutions Architect at E Tech Group. “We see a high demand for cybersecurity professionals that understand the OT side and are excited to … Continued

Read More

Integrating an Electrical Power Monitor System in Parallel with an Existing System

E Tech Group installed and commissioned a standard Electrical Power Monitoring System (EPMS) in parallel with a data center’s existing system to maintain the original combined EPMS and Building Management System (BMS) until it could be upgraded.

The Project: Install a New EPMS in Tandem with an Existing EPMS & BMS System

A social media platform Data Center needed their standard Electrical Power Monitor System (EPMS) installed and commissioned to work in parallel with their older existing system. The existing system was a combined EPMS and Building Management System (BMS) and needed to remain in place, as the BMS portion of the system wasn’t being replaced yet.

The multi-building Data Center campus and the SCADA system in some of the buildings is the current standard SCADA software, but in other buildings, older SCADA software was in place from a different vendor needing alignment.

The client wanted to eliminate device connections utilizing the BACnet/IP protocol and replace them with Modbus/TCP protocol to ensure current system standards are being met. As well, they wanted to standardize points being polled and monitored to match the current standards of the newer sites within the data center fleet.

E Tech Group’s reputation within the client’s organization, performance on a prior project, and because our feasibility study gave the client confidence that the project had a high level of probability that it could be accomplished within the limited timeframe allowed, we were selected to complete this project.

The Challenge: Keep Everyone Calm, Meet Harsh Deadlines, Exceed Client Expectations

E Tech Group’s automation team knew they needed to provide continuity to rectify the impact the client was currently experiencing as well as become familiar with and operate within two systems instead of just one. The aggressive timeline coupled with multiple moratorium periods to work around required an incredibly strategic and efficient approach.

The client was concerned that it wasn’t feasible to have an additional system polling for data in parallel and the equipment wouldn’t be able to support the additional requests. Some of the equipment was already being polled by 3-4 other systems monitoring the data. E Tech Group:

  • Performed a feasibility study/risk assessment as an initial phase of this project.
  • Evaluated each device type to determine limitations and assess which devices might experience bandwidth, connection limit, and response time issues.
  • Developed a plan to mitigate the issues.

The BACnet/IP communication modules in the generator control panels needed to be replaced with Modbus/TCP communication modules. The design of the panels made it necessary to perform a Lock Out – Tag Out (LOTO) of each generator to install the new communication modules safely.  We worked with site Operations and developed a schedule to perform the work, aligning as much as possible with their planned maintenance activities.

The Solution: Gain the Client Confidence Needed for Our Team to Divide & Conquer

The Feasibility Study mentioned earlier provided confidence in the proposed solution, and its approval was a catalyst for team members to move forward knowing they had a tight timeline they were up against.

To divide and conquer, E Tech Group subcontracted the SCADA developer required by the customer and managed the development of the EPMS SCADA application.

  • PowerSCADA was the software platform used as the client’s standard.
  • It was developed in phases in order to meet the project schedule, which required tracking changes with each version and verification to ensure the final application incorporated all of the necessary edits.
  • Our team performed bench testing of each field equipment type using a Modbus simulation device to verify the graphic templates and tags were linked as expected.
  • We developed a commissioning plan and corresponding method of procedures for bringing the new system online.  To avoid impacts to the live system our team tested one device type at a time and monitored the health of the existing system, ensuring the two were able to function together without interruption or conflict.
  • Onsite and remote commissioning of the SCADA system and the data center infrastructure management (DCIM) interface.

The Result: Active Partnerships Create the Most Effective Control Systems

By partnering with the client, as opposed to just fulfilling a role or requirement, E Tech Group helped the customer get closer to their long-term vision of the system. The new EPMS system follows the standards used at other sites within the data center fleet.

The findings of the feasibility study proved to be accurate, and the information gathered allowed the system to be successfully commissioned without any major impacts to the live system.

The client stated they were incredibly satisfied with the way the project was executed during the lessons learned meeting at project completion. This successful commissioning of the EPMS SCADA application allowed the client to be ready for the upcoming project of integrating the Building Management System.

Proactively Protecting Against Cyber Threats

Secure Your Company with a Cybersecure Control System   Cybersecurity continues to gain more and more momentum in manufacturing, and for good reason. Some of these facilities can be responsible for millions, sometimes billions of dollars in business, quickly gaining attention and unfortunately becoming a target for a cyberattack if not properly secured.  At a time when manufacturing facilities tend to be one of the most impacted by the decline in available workforce, the need for more flexibility in production capabilities takes precedence over most other initiatives. The rush to connect available assets for consolidated control and monitoring, and integrating their data collection and analysis will sometimes push decision makers to leap before they look. Not always considering any of the following, or lack thereof, may become an active threat without proper planning:   Increasing IT/OT Convergence: Industry 4.0 & improving plant efficiency is a major driver for this convergence trend. Organizations see improved efficiency as a worthwhile end goal, but it does come with an expanding OT attack surface.   High-Profile Incidents: Noteworthy OT/ICS cyberattacks over the last several years have proved how easily these high-profile OT systems can be broken into causing real concern. Some examples are the Stuxnet worm, the Ukraine power grid attack, and the Colonial Pipeline ransomware attack. These examples show that OT/ICS incidents affect more than the targeted organizations.  Nation-State Threats: Nation-state actors have shown interest in targeting critical infrastructure and industrial sectors as part of cyber espionage or cyber warfare efforts.   Ransomware and Monetization: Ransomware attacks have evolved to target critical infrastructure and manufacturing facilities. These attacks have led to large downtime windows for the target organizations.   Regulatory and Compliance Frameworks: Governments and regulatory bodies are recognizing the need to establish cybersecurity standards for critical infrastructure sectors. Compliance requirements and guidelines are being developed to ensure the security of OT and ICS systems.  Supply … Continued

Read More

How to Ensure Useful Data Extraction from a PI Historian System 

Data is an ever-present and growing benchmark in all industries. However, sometimes it may feel like it’s cloaked in mystery. There’s often a question of, why is collecting process data important? You then start to go down the rabbit hole trying to answer…..How do you get data out of your equipment? How do you decide what to collect? After assessing the previous questions, how do you test, and if necessary, validate that all of that data is being collected as expected? Understanding a holistic approach to data collection and validation from an AVEVA PI Historian System can help provide a high-level, big picture understanding to the importance of process data. With more than 10 years’ experience as a group engineering manager, Matt Martin has a depth of experience with integrating AVEVA PI Systems within sites of various sizes – here’s what I’ve learned: Why is the Importance of Data Increasing?  The “why” question is the easiest one to answer. Everyone can agree that in the era of modern manufacturing, extracting data from your manufacturing processes is critical to a business’s success and ability to grow. This includes every level of production and management: Provides the operator at the plant floor level the ability to adjust and better control the manufacturing process on the fly Allows engineers better insight into trends and behaviors of the overall process to improve designs from both a throughput and efficiency standpoint Produces KPIs (key performance indicators) for managers and executives to assist in their decision making Having large representative data sets is becoming even more important with the advent of AI and more specifically machine learning. Allowing these technologies access to your systems data helps identify patterns, overall system behavior, and correlations that were previously near impossible for the human eye to uncover.  Now, How … Continued

Read More