• 1-877-741-2410

EMPOWERUP VIRTUAL: HISTORIAN 9 FIRST LOOK & MORE | MAY 4, 11 AM ET

emPOWERUP Virtual 2021 Agenda

GE Digital Historian 9.0 – An Enterprise Data Management Platform

Presenter: Greg Hazel, GrayMatter

Get the latest intel on GE Digital Historian 9.0, a major upgrade debuting in March that features:

• Remote Collector Management (Configuration Hub UX)
• Enterprise Management Tool
• Collector Install Simplification & Configuration Tool
• OPC-UA Server, Azure IoT Hub End Point
• Horizontal Scalability, Historian HD Update for Enterprise-wide Data Visibility

Connecting and Increasing Efficiencies
with IoT, Wireless and Cloud Solutions

Presenter: Kelli Settell, GrayMatter

Learn how you can implement Edge and wireless devices that are secure and quick to deploy with your existing equipment and controls. Enable your facility and update your machinery in a streamline approach to increase your uptime and efficiencies, head off any unplanned downtime, and improve machine insight.

The session will highlight Emerson’s Edge technology as a means of securely capturing existing critical data and wireless technology additions as needed to feed a cloud or on-premises SCADA system and analytics packages. We’ll also spend time discussing browser-based flow editing two quickly and efficiently connect industrial hardware devices, APIs and cloud web services such as Microsoft Azure that provide the secure backbone for powerful Advanced Industrial Analytics solutions.

deceptionGUARD: Deceiving Cyber Criminals
& Harvesting Intelligence to Protect Industrial Operations

Presenter: Scott Christensen, GrayMatter

GrayMatter’s cybersecurity director outlines GrayMatter’s new deception technology offering, deceptionGUARD.

We’re simplifying the process of deploying virtual decoys and sirens to stop cyber-attacks by diverting them to harmless, fake targets at your network’s perimeter. Learn about how virtual decoys and sirens mimic real industrial PLCs and network traffic and automatically trigger an alert when  threats perform a network reconnaissance scan or attempt to gain access. Deception technology makes it easy to block traffic by geo-location, tailor protection specifically for an organization’s Operational Technology network and act early in the cyber kill chain.

Ready to start a project?

Looking to begin an advanced industrial analytics strategy, cybersecurity assessment, deception technology or to simply know where to start? We can help.


Get Started

Start a project or get in touch with GrayMatter