PACSystems™ RSTi-EP CPE200 Series
Compact Programmable Automation Controllers
Everything you need today to meet the business challenges of tomorrow.
The RSTi-EP CPE200 Compact Controller Series, with its built-in safety design, open programming and open communications, simplifies connectivity to traditional sensors and actuators as well as external analytical software platforms.
Simplifies connectivity to legacy sensors and actuators, as well as external analytical software platforms, while reducing cost and complexity for OEMs and end users.
The compact controller family simplifies connectivity to traditional sensors and actuators, as well as external analytical software platforms, while reducing cost and complexity for OEMs and end users.
Featuring the same high-performance runtime and toolchain as the PACSystems™ RX3i large-format controller, this compact controller family
It provides large programmable logic controller (PLC) functionality in a smaller footprint.
The PACSystems™ RX3i is designed to provide the functionality of a large programmable logic controller (PLC) in a small footprint, yet be small, cost-effective, and IIoT-ready so machine builders don’t have to sacrifice productivity or performance.
Out-of-the-box cybersecurity
Industrial controls have always been a target for cyber threats. We understand the risks involved in protecting our customers’ most important assets.
We believe in defence-in-depth architecture to secure assets from potential cyber threats.
The RSTi-EP CPE200 Compact Controller Series is Achilles Level 2 certified and has been designed with technologies such as Trusted Platform Modules and Secure Boot to ensure security.
Technologies such as platform modules and secure boot to prevent malicious applications and ‘unauthorised’ operating systems.
Centralised configuration allows encrypted firmware updates to be performed from a secure central location. an extensive set of network security technologies and tools help prevent unauthorised updates.
while built-in secure communication protocols help prevent man-in-the-middle and denial-of-service attacks.
Leave a comment
Your email address will not be published. Required fields are marked *