As the hub for seamless Industrial Internet of Things (IIoT) connections, MC-Edge RTU is P25 Radio, LTE Telus and LoRa ready, capable of handling inputs from hundreds of low-power wireless sensors up to 10 km. And with extensive security and ultra-reliable communication capabilities, MC-Edge makes it easy to implement, support and grow your IIoT systems to fully support all your mission-critical operations.
This intelligent RTU protects your sensitive data from cyber attacks with end-to-end encryption. Full authentication, bulletproof access control and digital signatures keep your information safe.
DIN Mount RTU with the capabilities to mix and match any combination to a total of Five I/O cards per MC-Edge:
– 8DO 2AO Module
– 12DI 8 AI Module
– Mixed IO 7DI 6DO 1AO 3AI
The MC-Edge is a Linux-based machine which provides the ability to deploy software at the edge using:
- IEC61131 Programming.
- Ladder logic
- Sequenctional function Block (SFB)
- Structured Text
- "C" Language
- Motorola MDLC
- DNP3.0 serial
- DNP3.0 IP
- Modbus RTU
- Modbus TCP/IP
As the hub for seamless IIoT connections, MC-Edge is P25 Radio, LTE Telus, and LoRa ready, capable of handling inputs from hundreds of low-power wireless sensors up to 10 km.
Role-based Access Control
Verify access to an MC-Edge is legitimate from both other edge devices or system users with authentication. Assign specific roles and permissions to perform certain operations based on those roles (i.e., security admin could define roles and assign permission to each user.)
Time Window Commands
Add additional layers of defense to limit the risk of replay attacks such as a disgruntled employee with legitimate access. Timestamps are added to the command messages. The subsequent “action” must be received within a designated time and contain elements that match - otherwise the action will be rejected.
Data-at-Rest (DAR) protection ensures all sensitive data stored on devices or applications is encrypted with FIPS 140-2 validated AES 256 bit encryption significantly reducing the threat of lifting confidential data from compromised devices. Secure data in transit with end-to-end encryption with AES 256 bit encryption.
Automatically look for malicious activity or violations of security policies. The MC-Edge will only allow legitimate traffic to enter and block malicious activity. Unauthorized activity is logged and can be reported to a designated control center.
Permit or deny data transmission into your system or device based on rules and established criteria. All IP messages must pass through a firewall which examines each one and blocks those not meeting security criteria.
Unused Port Deactivation
P: 1 403-259-7431
130, 6807 Railway St SE
Calgary, Alberta T2H2V6
P: 1 403-259-7425