Robot Network Security

RAD solutions are used in a variety of markets for critical infrastructure like corporate headquarters, healthcare campuses, higher education campuses, event venues and government facilities.

Securing The Robots

There is no magic bullet for robot security. They are simply devices executing code, which are just as likely to be compromised as any other device in an organisation.

Report: Cyberattacks on Industrial Robots

Trend Micro recently released the first in-depth, hands-on research that demonstrates the extent to which industrial robots can be compromised.

Amazon patents system to defend drones against hackers, jammers … and arrows

Alan Boyle for GeekWire:  If there are any Robin Hoods out there who are thinking about shooting down drones while they’re making deliveries, Amazon has a patented plan to stop you. The patent, filed in 2014 but published just last week, lays out countermeasures for potential threats ranging from computer hacking to lightning flashes to bows and arrows. If nothing else, the 33-page application illustrates how many things could possibly go wrong with an autonomous navigation system for unmanned aerial vehicles, or UAVs. The “compromise system” that Amazon’s engineers propose relies on an array of sensors to orient the drone based on the sun’s position in the sky, if need be. That’s in case the drone gets confused by, say, lightning or a muzzle flash.   Cont'd.. .

Records 1 to 4 of 4

Featured Product

EPC'S NEW 3D Configurator is more than just a fun tool

EPC'S NEW 3D Configurator is more than just a fun tool

EPC is excited to announce our NEW online 3D Configurator. This new tool makes it even easier to configure EPC's products exactly how you need them for your application. The 3D Configurator interface is intuitive and works in any web browser for both desktop and mobile. It'll only take you a moment to learn your way around the program. Careful, though: it's so fun to play with, you may spend a whole afternoon on it!