System upgrade: MTL Matrix 8.2 integrates Wonderware platform, extends security

01/02/2008


MTL Open System Technologies (MOST), a member of the MTL Instruments Group, has now released its Matrix 8.2 process control system that features extended integration with Wonderware’s System Platform 3.0 software and enhanced security.

"Our control solutions have always made extensive use of Wonderware software solutions such as InTouch HMI, Wonderware Historian (formerly known as the IndustrialSQL server) and InBatch (recipe management). The integration of System Platform 3.0 offers our customers major benefits: significant reduction in project engineering and deployment costs, easy expansion of existing systems, enhanced production and performance management reporting and integration with enterprise-wide business systems," says Dave Reynolds, MOST marketing vice president.

MOST's process control system, Matrix 8.2, reportedly uses Wonderware System Platform 3.0 software to manage and coordinate automatically the development, modification, and deployment of control application components. Each of the components or templates contain all the information necessary for alarming, trending, historical recording, and security for process control tasks including PID loops, motor control, I/O interfacing, and diagnostics. Graphical representation of these components is through a set of Wonderware smart symbols.

Wonderware System Platform 3.0 software is built on Invensys' Archestra industrial service-oriented architecture (ISOA). The company says this enables plant engineers to design, develop, deploy and maintain process control and functional safety systems for a wide variety of applications. In addition, Archestra architecture enables System Platform 3.0 to offer one platform or toolset that can integrate plant floor systems with enterprise-wide business systems.

Matrix 8.2 provides enhanced system security, ensuring that only authorized users can make changes to the system. Security features have expanded beyond secure logons with different access levels for each user to include the following advanced features:

  • A trusted host table ensures that only specified MAC addresses may write data to the controller;

  • The controller can be password protected so that only those that know the password can make certain changes;

  • The controller supports a protected mode where configuration changes cannot be made;

  • A keyswitch can also be used to lock the controller so no other changes can be made; and,

  • Data is CRC checked to ensure it was modified by the workbench and not an outside tool.

These enhanced functions are designed to compliment Wonderware’s extensive security features. The Wonderware System Platform 3.0 model supports security down to individual data elements. System Platform 3.0 software reportedly enables every single object and attribute in a network to be locked down, both from a development and run-time point of view. As data travels through the network, information about who made the request, that person’s role, permissions, and in some cases, encrypted password information accompanies the data. This extensive data security is designed to enable compliance with FDA 21 CFR Part 11 with proper certification.


—Edited by Peter Welander, process industries editor, PWelander@cfemedia.com ,
Control Engineering Weekly News





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Go deep: Automation tackles offshore oil challenges; Ethernet advice; Wireless robotics; Product exclusives; Digital edition exclusives
Lost in the gray scale? How to get effective HMIs; Best practices: Integrate old and new wireless systems; Smart software, networks; Service provider certifications
Fixing PID: Part 2: Tweaking controller strategy; Machine safety networks; Salary survey and career advice; Smart I/O architecture; Product exclusives
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Look at the basics of industrial wireless technologies, wireless concepts, wireless standards, and wireless best practices with Daniel E. Capano of Diversified Technical Services Inc.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.