News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

E Tech Group Acquires Automation Group

Acquisition adds to E Tech Group’s growing expertise and reach into the Data Center and Food & beverage industries E Tech Group announced today the acquisition of Automation Group, a California-headquartered system integrator specialized in automation, robotics and cybersecurity. Terms were not disclosed. Automation Group will operate under the name “Automation Group, an E Tech Group Company.” Founder Brad Stegmann will step down from his CEO role but will consult with the business during the transition. Automation Group President Randy Ruano will remain with the company, and no significant employment changes are anticipated in any of Automation Group’s locations. Automation Group’s 12 locations are spread throughout northern and southern California, as well as Denver, Dallas-Fort Worth, Indianapolis and Williamsburg, Virginia. Together, the combined company is one of the largest independent automation engineering and system integration firms in North America, with approximately 30 locations and 600 team members. This is E Tech’s second acquisition in 2023, capping off another year of strategic growth that began with the acquisition of E-Volve Systems in February. “With the addition of Automation Group, E Tech Group expands its market-leading positions in automation of Life Sciences, Data Centers, Consumer Packaged Goods, and Food and Beverage industries,” said E Tech Group CEO Matt Wise. “The addition also brings significant cybersecurity expertise, accelerating our rapid growth in this segment and enabling us to better serve our clients with IT/OT vulnerability assessments and remediation.” Said Stegmann and Ruano in a joint statement: “We have tremendous respect for the E Tech Group platform and are confident this will be a seamless transition that will quickly pay dividends for clients of both companies. We’re also excited about the career opportunities members of the Automation Group team will enjoy as part of a larger, fast-growing organization like E Tech Group.” About E … Continued

Read More

Detecting Cybersecurity Threats in Operational Technology (OT) and Industrial Control Systems (ICS) 

One of the most crucial safeguards for Operation Technology (OT) is the ability to detect cyber threats within OT networks in real time. Given the importance of availability and uptime, the ability to quickly detect potential threats and respond with appropriate measures is highly stressed. Detection and prevention strategies must be carefully crafted for OT Networks to avoid excessive false positives and potentially unnecessary disruptions.  Let’s look at the key characteristics of a threat detection program:   Tracking key assets and data: Automatically tracking and assigning value to all OT assets, including hardware, software, and network devices.   Logging and Auditing: Comprehensive logging of all activities and events for auditing and forensic analysis in a centralized system.  Alerting and Response: It includes alerting mechanisms and a well-defined incident response plan to respond quickly to detected threats.  Threat Intelligence: To stay informed about emerging threats specific to OT environments, the program integrates threat intelligence feeds and data from various sources.  Continuous Monitoring: The program entails real-time monitoring of the OT network to detect anomalies and potential threats.   Utilize your Asset Inventory to scope your Detection System  Organizations need to first determine what their critical assets are and then prioritize resources accordingly, such as log retention, and frequency of log reviews making informed decisions about which log data should be forwarded to their centralized logging solution.  Identify key assets and data   Assess common threat vectors   Review industry best practices   What logs should be monitored?   Not all unusual events point to malicious activity or demand further investigation. Here are some examples of events that should be monitored on a regular basis, according to the NIST 800-82r3 Publication:  Information Events   Account lockouts   Unauthorized creation of new user accounts   Unanticipated remote login activities   The deliberate erasure of event logs   Event logs becoming unexpectedly saturated with data  Antivirus … Continued

Read More

Nick Hasselbeck Promoted to Vice President of Information Technology

Congratulations to Nick Hasselbeck on his promotion to Vice President of Information Technology! Nick is a valued member of our executive team, providing leadership and guidance on technology, cybersecurity, and integration initiatives. Nick has over 20 years of experience in information technology and has led or been a key contributor to several successfully executed projects that are differentiating us from the competition. His advanced software team has built outstanding custom tools for our client that are now critical to their operations. His internal development team has been on a roll recently, upgrading several companywide tools.  Not to mention all of the cybersecurity work his team does to protect E Tech Group. Congratulations once again to Nick Hasselbeck!  Thank you for your dedication, and enthusiasm to your work and E Tech Group.  

Read More

S88 Specs, Part 3 of 3: Understanding S88 States

After reviewing parts one and two of this three-part series, you now have a conceptual and visual understanding of the S88 standard and its applications.  If you haven’t yet read the first two parts of this series, check out S88 Specs, Part 1 of 3: An Introduction to the S88 Standard and Part 2 of 3: System Modeling Under S88 Standard. Transitioning S88 States Throughout Production In this last entry, we’ll provide the final piece of the puzzle, bringing it all together. We’ll examine the progression through the numerous defined states associated with the manufacturing process as it aligns with S88 and the corresponding model.     Understanding S88 States in Control System Modeling The S88 standard defines various states that units or phases can transition through during their operation. These states, categorized as an Initial State, and Quiescent, Final or Transient states, provide a standardized framework for interaction between recipe phases and control system equipment and control module phases. Let’s explore some of the key states defined by the S88 standard: Quiescent states Held Paused Final States Aborted Stopped Complete Initial State   Idle Transient states Starting Restarting Running Aborting Holding Pausing The states listed here are the typical implementation. The procedural state model can be expanded or collapsed as permitted by the standard. The figure below shows the basic state diagram. Fig.4 State Transition Diagram SC Denotes State Change – state logic completes normally and the state advances as indicated by arrows. Text over the arrow Start, Resume etc. are external commands from batch application or internal to the control system or operator issued. The Hold, Stop, Abort are unique in that they act on multiple steps contained within the shaded rectangles. Handshake signals are implemented between the control system and batch system through command and status bits. They … Continued

Read More