A plant’s control room used to be an isolated island. Now an entire operation can be monitored and controlled from anywhere using technology tailored to match exactly what the company needs.
So how is it possible to create such an interconnected environment? For the rest of this white paper, we will look at six use cases that illustrate different ways to handle remote access implementations in a variety of contexts. Many differences are subtle, but over the years and through thousands of projects, Yokogawa has demonstrated the ability to tailor solutions to work optimally in these different situations critical to its clients’ success.
In this white paper, we review 6 example approaches using:
Speakers 1 Name
Speaker Title
Company
Mr. Jeff Melrose is the Principal Technology Strategist for Cybersecurity at Yokogawa Corporation of America and has over 20 years of experience in Computer Security. Prior to his assignment with Yokogawa, Mr. Melrose was a Principal Security Engineer at Lockheed Martin and Raytheon designing secure systems for the US Military.
Speakers 1 Name
Speaker Title
Company
Mr. Jeff Melrose is the Principal Technology Strategist for Cybersecurity at Yokogawa Corporation of America and has over 20 years of experience in Computer Security. Prior to his assignment with Yokogawa, Mr. Melrose was a Principal Security Engineer at Lockheed Martin and Raytheon designing secure systems for the US Military.