Policy assisted actions in EVA ICS

I was given by one of our team members of the link to the article, where the joined team of engineers from 3 USA universities reviewed industrial and home automation systems, including EVA ICS. First of all, I must say I am proud and impressed that our platform becomes more and more popular in IoT world, second – I am happy EVA ICS shown the best results in tests, third – I would like to ask the article authors to review EVA ICS 3.3.x, which has got, in comparison to 3.2.x, more improved asynchronous core, which gives huge speed and memory advantages.

However, it was mentioned, EVA ICS has no policy-based actions, which is incorrect, and let me explain how to use them in the real production:

Continue reading “Policy assisted actions in EVA ICS”

IoT and security

In IoT “S” stands for security
(c) one smart guy in Twitter

Weak security is a major problem of almost all modern IoT and IIoT/Industry 4.0 solutions. There’s usually nothing wrong when equipment state or shadow state is available for nodes in your configuration, as one of Industry 4.0 design principles is “Information transparency”.

However things change when we start talking about control. Allowing nodes to control each other and send action API calls is dangerous: if attacker get an access to information exchange point, he can destroy your business or even your life.

Continue reading “IoT and security”