VIDEO: ThinManager 10 » New Features

ThinManager 10 is full of new features to make life easier from the administrator to the end user. This version puts a focus on security and productivity and we are ready to tell about some of these exciting new features. Let’s take a look at what’s new.

Authentication Passthrough (productivity)
A successful login into a ThinManager terminal will now pass a security token into FactoryTalk Security, and any running session(s) of FactoryTalk View SE on that terminal will automatically take that security token to log in the associated user.  For instance, if you have multiple sessions being delivered to a terminal in a control room environment, this will dramatically simplify the login process. [...]

It’s in to be thin

ThinManager was mentioned in a recent LinkedIn Post from InSource Solutions about how thin client technology is more manageable, scalable and mobile.

Below are excerpts written by Jason Paquette, Product Marketing Manager at InSource Solutions, from his post regarding thin client management and mobility with an HMI.

Happy Manufacturing Day

Today, October 2nd, 2015, is Manufacturing Day. Manufacturing Day℠ is a celebration of modern manufacturing meant to inspire the next generation of manufacturers. This is an exciting opportunity as many manufacturers are opening their doors to the public today to offer tours and to show just how the manufacturing process works for them.

As a “tip of the cap” to all those in this great industry, we have put together a video about ThinManager in a sit down interview with ACP’s CEO, Matt Crandell, asking where it all started, and where it is going.  ThinManager is the global leader in thin client management and industrial mobility.  Without our partners and customers in the manufacturing industry, we simply would not be where we are today. [...]

Using ThinManager – Location Resolver Technology

ThinManager’s zero client computing has always been the most secure way to deliver content to your plant floor terminals. The industry leading security of ThinManager now offers the only location-based mobile platform that allows you to create & configure secure “walls” around your data and applications using location resolvers. You gain complete control of the floor through their configuration. We call this location-based technology Relevance.

Location resolvers in Relevance are used to define locations throughout your plant. Examples of defined locations can be as broad as the entire network, a tethered thin client terminal, or a defined “geo-fenced” area.  Relevance uses technologies such as Bluetooth, WiFi, GPS, NFC and QR Codes to let administrators define an unlimited number of locations. [...]

Data Secure with ThinManager

Using ThinManager – Safety and Security

Data Security – not just a buzzword.  Today we know all too well that our data is important and keeping it secure and safe is often even more important.

This video focuses on the security and data safety in ThinManager.  ThinManager gives you complete control in your production environment over who sees what, where and when.  Secure data management has always been in the forefront when creating ThinManager. Our location-based resolvers create “Geo-Fences” for total security when integrating mobility in to your production environment. [...]

Authenticate Your Way

User Authentication with ThinManager

With so much sensitive data and information out there in your network applications and tech these days, security and proof of identity are of the utmost importance.  When people think security with technology they think first about user authentication.  Most likely they think usernames and passwords, maybe pass-codes as on most mobile devices.

In a modern factory or production environment using ThinManager, there are several options at your disposal to make user authentication fast and amazingly safe and secure.  ThinManager syncs with your existing Windows network Active Directory to provide an easy entry to your users and user authentication. [...]

ThinManager Control Terminal

Build The Ultimate Control Room

In today’s modern production environment visualization is not only important, it is essential.

Visualization is one of the cornerstones of ThinManager and building your ultimate control room to see everything in your production environment is simply put… “A Piece of Cake”!

Start by obtaining a capable thin client, one that can support multiple monitors. We like a configuration for at least 4 large monitors.  Need suggestions, look at the ThinManager Knowledge Base of ThinManager ready hardware. Install and layout your monitors.

sample ThinManager monitor configurations

screen-configUsing ThinManager you can now assign your control room thin client with all the applications, HMIs, IP Camera Feeds and Desktops that you will need to operate in complete control with optimal visualization of what is happening in your production environment. [...]

Operator Using Camera

Increase Visualization with IP Cameras

When you think about IP Cameras in your work environment, what comes to mind?  You might think of monitoring safety and security of the facility.  That is a completely valid thought.  For many facilities that is likely the main reason that cameras were put in to place.

IP Camera use, especially in the last 5 years, has given way to much more.  A new focus in a modern production environment is “increased visualization”.  Increasing visualization can spawn from anything that makes you more productive by way of seeing more information.  The use of cameras allows you to have an in-depth feel for an environment, not just a view of the screen at the terminal. [...]

Real Security Is About Prevention Not Recovery

Over the last few months, we have been hearing more and more about the Stuxnet Worm.  Originating in 2007, it became a topic of conversation in the main stream media after its global deployment in 2010.  At the time, Symantec reported that less than 2% of all known Stuxnet infections were on machines in the United States.  Now, almost two years later, it is once again front and center for both its relationship to the newly discovered Flame malware, and recent surge in infecting new networks and machines. [...]