Endian Training and Certification
Endian offers a two-tier technical certification program to greatly increase your knowledge on installing, managing and troubleshooting the Endian platform. In addition, we offer a introductory trainings which can help your company sell Endian like an expert.
Endian Training and Certification
Endian Introductory Trainings
The course helps to provide comprehensive training on all the available features of Endian to give you all the tools you need to confidently sell Endian, configure and manage it. Providing a complete overview of Endian products and services it is also ideal for salespeople and end users.
Endian Certified Security Administrator
The ECSA certification validates the ability of a network security professional to maintain day-to-day operations of Endian solutions. This convenient course is a two-day online certification that combines a comprehensive curriculum with in-depth live teaching demonstrations.
Endian Certified Security Expert
The ECSE certification is the highest level of technical training (requires ECSA certification). This program provides complete and in-depth technical training about the inner workings of Endian allowing you to gain a total understanding of Endian from the inside out.
EndianOS UTM
At the core of the Endian ecosystem is EndianOS which powers the entire Secure Digital Platform. A security focused operating system built to provide the complete networking, security and connectivity stack in an intuitive and easy to operate solution.
Zero Trust Architecture
With the arrival of the digital transformation in combination with a distributed and global remote workforce, organizations can no longer use legacy security models. In the new Zero Trust architecture, businesses trust less and verify everything so they can reduce their attack surface using fine-grained access, authorization and security policies. In addition, a Zero Trust environment ensures stronger and better compliance and audit efforts.
Network Visibility and Monitoring
Before an organization can implement a Zero Trust model, they must identify and assess every single device on their network. Using traditional methods can be costly and resource intensive and requires frequent and constant monitoring. With Network Awareness, a business can quickly and easily achieve and maintain visibility to discover all connected assets and protect themselves from threats.
Microsegmentation
As part of the Zero Trust architecture, creating smaller and more targeted network zones increases security while reducing risk exposure. By utilizing powerful security policies to enforce zone boundaries organizations can ensure only approved network communications. As required, businesses can create least-privilege secure pathways using technologies like NAT (Network Address Translation) or VPN (Virtual Private Network).
Edge Computing
The concept of edge computing simply means utilizing computing resources at the edge of the network (instead of the central network or datacenter). By leveraging Docker and container technology, organizations can leverage micro services and applications to replace or extend edge network capabilities. Whether it’s data collection, analytics, monitoring or automation the possibilities are endless for edge computing.
Work from Anywhere
The global pandemic introduced everyone to the Work from Anywhere era which brought with it a host of security concerns and issues. This reinforces the need for the Zero Trust model which can be achieved using powerful, yet flexible VPN which enforces strong user (multi-factor) authentication and authorization.
Threat Management
For approved network communications, a business must go deeper to ensure they are actually safe and secure. The threat management toolset helps to detect and stop advanced threats and malware from infiltrating business networks. Using deep-packet intrusion detection and prevention to identify and enforce security policies. In addition, application layer and protocol analysis helps to ensure traffic validity and block traffic regardless of IP address or port.
Secure Web and Mail Communication
To ensure businesses continuity and resilience, organizations must take steps to enforce strong network policies that maximize productivity while reducing disruption. This includes the protection of major internal communications channels like web browsing and email. Using secure web and email protection technologies, businesses can keep their employees and networks safe.
Connectivity
In order to secure every thing you must connect to every thing. Our products support multiple forms of Internet and SCADA connectivity including Ethernet, WiFi, 3G/4G, Serial (RS-232/485) and DI/DO (Digital Input/Digital Output). They also come available in industrial form factors with DIN rail mount, desktop mount, 24V DC power input and with support for wide temperature for the most rugged deployments.
Security
Security is the key to a successful digital IoT transformation. Endian has been a leader in in creating easy-to-use security products for over 15 years.
- Connect Platform combines secure remote access and comprehensive user/device permission management
- 4i Edge devices provide powerful network security including network segmentation, complete firewall control, deep-packet IPS/IDS system and layer-7 filtering capabilities
Endian achieves IEC 62443 Certification
Endian is proud to announce that the Secure Digital Platform (Switchboard and 4i Edge X) are IEC 62443 certified for both 62443-3-3 (System Security) and 62443-4-2 (Component Security) at SL2 security level. This certification ensures that customers using the Endian Secure Digital Platform are able to meet or exceed the industry standard for industrial and automation cybersecurity.
Connect Platform – Remote Access
- Browser-based client
- Works on any platform (desktop, tablet, mobile)
- One-click supported apps run inside the browser
- Traditional VPN client
- Full network access
- Support for Windows & Mac OS X
- Support for Layer 2 connection to remote network
- Enables use of on-site PLC programming tools like Siemens, Beckhoff, etc
Orchestration
Given the number of industrial devices and the geographical span of global businesses, you need the tools to make deployment and management easy. The Endian Connect Platform gives you multiple Zero Touch deployment options including Plug & Connect and USB stick options to cover online and offline remote sites. In addition, it includes Endian Management Center which provides ongoing device configuration management.
Data Collection
Collecting data from your IoT devices can enable companies to “see” their data in a new way that enables real-time services (support, management, etc) and creates a product feedback loop to enable faster and better product development.
- 4i Edge devices act as a collector of SCADA data using commons protocols like Modbus (TCP/RTU), OPCUA, and Siemens S7. It then securely transmits the data to the Switchboard for central storage.
- The Switchboard (server) securely stores and aggregates data and provides customizable dashboards to view the data in any way desired
Monitoring
Industrial infrastructure is critical to the core operations of business and requires the highest levels of availability. The Connect Platform provides integrated monitoring capabilities to monitor and alert on virtually anything so business can react instantly to potential problems.
Analytics
Once you have all of your industrial data aggregated, the next step is to analyze the data in order identify patterns and anomalies that can help predict failures and solve product issues before they become major problems. The Connect Platform can provide dashboards with completely customizable interfaces to show users the data they want to see in the way they want to see it.
Computing
Containers are revolutionizing the IT world with the concept of wrapping applications into a portable and highly available system. The new Connect Platform and Endian 4i Edge X product will now support installing and managing containers at the industrial network edge. This will give businesses unparalleled flexibility to deploy applications in new ways like moving apps to the edge or even using hybrid apps with client software running on your edge appliance saving massive amounts of time and money!
Endian Anatomy of a Secure Digital Platform
The structure of a secure digital platform in Industry 4.0 is composed of many parts all working together to form a complete solution. This guide explains the most important seven parts of the platform.