<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Smart Building Design</title>
	<atom:link href="https://www.smartbuildingdesign.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.smartbuildingdesign.com/</link>
	<description></description>
	<lastBuildDate>Fri, 12 Sep 2025 15:07:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.smartbuildingdesign.com/wp-content/uploads/2022/08/favicon.png</url>
	<title>Smart Building Design</title>
	<link>https://www.smartbuildingdesign.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wireless Without Worries: A Conversation with LumenRadio on the Future of BAS Connectivity</title>
		<link>https://www.smartbuildingdesign.com/lumenradio-wireless-bacnet/</link>
					<comments>https://www.smartbuildingdesign.com/lumenradio-wireless-bacnet/#respond</comments>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 14:27:54 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[wireless BACnet]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=3158</guid>

					<description><![CDATA[<p>As the demand for smarter, more flexible building systems grows, wireless technology is playing an increasingly critical role in the future of Building Automation Systems (BAS). Historically seen as less reliable than their wired counterparts, wireless solutions have made major advancements in reliability, scalability, and security. One of the companies leading this evolution is LumenRadio, [&#8230;]</p>
<p>The post <a href="https://www.smartbuildingdesign.com/lumenradio-wireless-bacnet/">Wireless Without Worries: A Conversation with LumenRadio on the Future of BAS Connectivity</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As the demand for smarter, more flexible building systems grows, wireless technology is playing an increasingly critical role in the future of Building Automation Systems (BAS). Historically seen as less reliable than their wired counterparts, wireless solutions have made major advancements in reliability, scalability, and security. One of the companies leading this evolution is LumenRadio, whose wireless BACnet solution is changing the way integrators and building owners approach system design and deployment.</p>



<p>In this interview, I sit down with Maciej Oldziej, the general manager of LumenRadio, to explore the current state of wireless in the BAS space, learn what sets their technology apart, and discuss how their wireless BACnet solution is enabling faster installations, reduced cabling costs, and more flexible building environments.</p>



<h3 class="wp-block-heading"><strong>Wireless adoption in BAS has historically been slow. Why do you think that’s been the case, and what’s changing now?</strong></h3>



<p>Reliability. Wireless is a household term, but within the BAS world, it is a term that sparks fear and uncertainty. At LumenRadio, we are educating the BAS community that there is a reliable wireless solution to meet their needs.</p>



<p>In my opinion, there are two primary factors driving wireless adoption for the retrofit market: limited labor force and decarbonization targets. The continued rising cost of building materials is a contributing factor.<br><br>For instance, in the education sector, approximately 79% of air handling units (AHUs) sold are for retrofit projects.</p>



<h3 class="wp-block-heading"><strong>What are some of the most common misconceptions about using wireless technology in building automation systems?</strong></h3>



<p>It doesn’t work, or that technology hasn’t evolved. The BAS industry is slow to adapt and accept new technologies, especially considering its historical sub-par experiences with wireless.</p>



<h3 class="wp-block-heading"><strong>From your perspective, what are the key advantages of wireless over traditional wired BAS installations?</strong></h3>



<p>Reduce Install Burden: costs and time of installation. Minimized tenant and space disruption. More predictable cost analysis. And easier troubleshooting vs. trying to find where a fault is on the wire trunk.</p>



<h3 class="wp-block-heading"><strong>What types of building environments are the best candidates for wireless BAS deployments?</strong></h3>



<p>We are seeing success in Hotels/Resort, Schools, and Medical Office Buildings. Historical buildings like courtrooms, churches, and museums. Warehouse and Manufacturing sites are also a great contender with wide open spaces that want to limit day-to-day disruption.</p>



<h3 class="wp-block-heading"><strong>How has wireless reliability and security evolved over the past five years in the BAS industry?</strong></h3>



<p>With the adoption of IoT and remote monitoring, the security and privacy concerns have shifted to the cloud. BACnet Secure has been part of the conversation, but the adoption has been slow. IT departments want to know everything and anything on their local networks. &nbsp;</p>



<h3 class="wp-block-heading"><strong>What should building owners and operators consider when deciding between wired and wireless BAS systems?</strong></h3>



<p>Wireless systems are more flexible. If the building owner and operator have leasable spaces that are prone to change, wireless has a distinct advantage vs. wires. If the space is actively used 24/7 or only accessible during specific hours, wireless can help offset the install burden.</p>



<h3 class="wp-block-heading"><strong>How do you address concerns around interference with other wireless devices and networks in commercial buildings?</strong></h3>



<p>This a core value at LumenRadio; Wireless Without Worries is our motto. Our 19 patents in Wireless Networking allow us to be interference free and not interfere with other existing and future technologies.</p>



<p>Historically, many technologies are prone to network congestion or interference. For example, a stadium filled with people and smartphones, or an office building with BLE, WiFi, Microwaves, and other technologies contributing to the on-air congestion.</p>



<h3 class="wp-block-heading"><strong>Are there any regulatory or compliance factors to keep in mind when using wireless BAS technology?</strong></h3>



<p>In North America, you want FCC-compliant devices. Each device should have an FCC ID in the unlicensed bands like 2.4 ghz. If using LTE/Cellular technologies, additional certifications may be required.</p>



<p>Another thing to look out for is data storage and data visibility implications. When considering IoT, cloud, and wireless systems is paramount to understand how the data is being used and access control to ensure operational integrity within BAS systems.</p>



<h3 class="wp-block-heading"><strong>Can you give us a high-level overview of LumenRadio’s Wireless BACnet solution?</strong></h3>



<p>It’s rather simple! We replace cable runs between BACnet MS/TP field devices. Think of it as replacing a wired RS-485 trunk with a “wireless trunk”. The Wireless BACNet Mesh solution is a plug-and-play wireless MS/TP cable.</p>



<h3 class="wp-block-heading"><strong>What sets LumenRadio’s technology apart from other wireless solutions in the BAS space?</strong></h3>



<p>Cognitive Coexistence! It’s our core IP innovation that enables interference free transmission without the complexity of network configuration. It enables us to work in any radio and physical environment.</p>



<h3 class="wp-block-heading"><strong>How does LumenRadio’s solution maintain BACnet compliance and interoperability across different vendors?</strong></h3>



<p>Wireless BACnet devices cannot be BTL certified because they are not addressable nor visible in the BAS. However, we maintain interoperability across vendors by mimicking the MAC address of the BACnet field device it connects to and transmitting transparent BACnet. The BAS does not know it is wireless. We are a true wireless cable replacement!</p>



<h3 class="wp-block-heading"><strong>Can you walk us through a typical deployment process using your wireless BACnet solution?</strong></h3>



<p>Let’s take a rooftop retrofit example where running a cable across the roof or underneath the ceiling is prohibitive. Instead of running a cable between each RTU, we will install an individual W-BACnet device at each RTU controller. Then, a W-BACnet Gateway will automatically discover all the RTUs that will be discoverable in the BAS.</p>



<h3 class="wp-block-heading"><strong>How does LumenRadio’s mesh network technology work, and what benefits does it offer for BAS installations?</strong></h3>



<p>Wireless BACnet is a self-configuring and self-healing mesh network. Each W-BACnet node is a repeater that can directly connect to the gateway or indirectly propagate its signal. If a node loses a signal, other nodes in the network will automatically find a path to maintain connectivity. The primary benefit of using our technology is the plug-and-play nature accelerating installation by removing control cable runs from the equation. We built the solution with the installer in mind equipping them with Bluetooth app to quickly verify their installation.</p>



<h3 class="wp-block-heading"><strong>What’s the typical range and scalability of a LumenRadio wireless BACnet network?</strong></h3>



<p>Range! It’s our #1 question. Range will depend on the environment and antennas used. Inside the building, on average, I see 50-700 feet between devices. Outdoors we can reach up to a mile line-of-sight. Our recommendation is to build wireless MS/TP networks in line with wired networks: 25-40 devices per Wireless BACnet network. And yes, you can have multiple W-BACnet networks within the same space.</p>



<h3 class="wp-block-heading"><strong>How do you ensure security — both at the device and network level — with your wireless BACnet system?</strong></h3>



<p>Our networks are stand-alone, not Wifi, with dynamic encryption methods. Thanks to our IP, we can mitigate network jamming attacks and safeguard against replay attacks. Only devices that are commissioned on-site can join W-BACnet networks.</p>



<h3 class="wp-block-heading"><strong>Can LumenRadio’s solution coexist with legacy wired BACnet systems? How does that integration work in practice?</strong></h3>



<p>Yes! A great example is failing Lon VAV devices. It’s common to upgrade 2-3 end-of-life Lon VAVs to BACnet VAVs without affecting existing infrastructure. As Lon VAVs continue to fail, we can add them to the existing Wireless BACnet network without affecting Lon infrastructure.</p>



<h3 class="wp-block-heading"><strong>Do you have examples or case studies where your wireless BACnet solution delivered significant cost or time savings compared to traditional wired approaches?</strong></h3>



<p>We do! A great example is a Resort FCU retrofit where the installers saved 90% on install cost vs. running wire, and with limited impact on the business – I don’t think resort guest would enjoy the sound of drilling holes and someone being in their room!</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>A big thank you to Maciej for sharing his insights on the evolution of wireless in the BAS space and the innovative work LumenRadio is doing with their Wireless BACnet solution. As buildings continue to grow smarter and more connected, it’s clear that wireless will play a key role in driving both flexibility and efficiency in system design. We look forward to seeing how LumenRadio continues to shape the future of wireless BAS technology.</p>



<p></p>
<p>The post <a href="https://www.smartbuildingdesign.com/lumenradio-wireless-bacnet/">Wireless Without Worries: A Conversation with LumenRadio on the Future of BAS Connectivity</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.smartbuildingdesign.com/lumenradio-wireless-bacnet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Part 2: Diving Deeper: The Technical Realities of Zero Trust in OT–A Conversation with Neeve </title>
		<link>https://www.smartbuildingdesign.com/part-2-diving-deeper-the-technical-realities-of-zero-trust-in-ot-a-conversation-with-neeve/</link>
					<comments>https://www.smartbuildingdesign.com/part-2-diving-deeper-the-technical-realities-of-zero-trust-in-ot-a-conversation-with-neeve/#respond</comments>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Fri, 16 May 2025 19:31:13 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=3133</guid>

					<description><![CDATA[<p>In Part One of our conversation, we explored the principles of Zero Trust and why it matters for remote access in smart buildings. But understanding the why is only half the equation. For those designing and deploying OT networks, the real challenge is the how—how to implement Zero Trust without breaking legacy systems, interrupting operations, [&#8230;]</p>
<p>The post <a href="https://www.smartbuildingdesign.com/part-2-diving-deeper-the-technical-realities-of-zero-trust-in-ot-a-conversation-with-neeve/">Part 2: Diving Deeper: The Technical Realities of Zero Trust in OT–A Conversation with Neeve </a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In Part One of our conversation, we explored the principles of Zero Trust and why it matters for remote access in smart buildings. But understanding the <em>why</em> is only half the equation. For those designing and deploying OT networks, the real challenge is the <em>how</em>—how to implement Zero Trust without breaking legacy systems, interrupting operations, or getting lost in complexity.&nbsp;</p>



<p>I sat back down with <strong>Aaron Brondum</strong>, <strong>Sr. Director of Business Development at</strong> <strong>Neeve</strong>, to talk through the technical side of Zero Trust, and how Neeve is helping real-world organizations deploy it in a way that’s actually usable in the field.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-fe396db1f3e1107c57ada1ef0fe76137" style="color:#076499"><strong>Greg Fitzpatrick, CxA, Business Development Leader, Cochrane Supply</strong></p>



<p>Aaron, thanks for joining me again. Last time we covered the fundamentals of Zero Trust. Today, I want to dive into the more technical side of things. For those out there trying to figure out how to actually <em>apply</em> Zero Trust to an OT network, where should they be thinking about placing the solution? <br> </p>



<p class="has-text-color has-link-color wp-elements-08faa496b7ff9ea4140118ea1a8d4f8e" style="color:#026f47"><strong>Aaron Brondum, Sr. Director of Business Development, Neeve</strong></p>



<p>Great question, and placement is everything. In OT networks, the best place to start is at the IT/OT boundary. That’s where the biggest risk is, and it’s where Zero Trust can act as a secure gateway. Every connection trying to cross that boundary gets verified—user identity, device health, even where the traffic is coming from and going to. </p>



<p>From there, we look inside the OT network and apply micro-segmentation. Instead of treating the entire OT environment as one big trusted zone, we break it into smaller ones, HVAC, lighting, elevators, each with their own access rules. That way, even if something is compromised, it can’t spread.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-f7e84a12a69bf2dd9ca71f1759251cbe" style="color:#076499"><strong>Greg:</strong></p>



<p>That makes sense, sort of like building a wall, then putting locks on every door inside it. But what about remote access? That’s where a lot of threats get in. How does Neeve handle that differently? <br> </p>



<p class="has-text-color has-link-color wp-elements-4274a25c0462aa51f77b67fbfca92d4a" style="color:#026f47"><strong>Aaron:</strong> </p>



<p>Exactly—and you’re right, remote access is the biggest attack vector in most smart buildings today. That’s why we don’t rely on VPNs. VPNs are a one-and-done deal: you authenticate once, and suddenly you’ve got a tunnel to the entire network. </p>



<p>We use Zero Trust Network Access (ZTNA) instead. It’s more surgical. A technician accessing HVAC controllers only gets access to those, and only for a set time. Every session is authenticated and encrypted, and we can revoke access at any point. It’s dynamic, and it’s role-based.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-14b768085aead57f37c870a4b9968d23" style="color:#076499"><strong>Greg:</strong></p>



<p>That’s a huge improvement, especially when you’ve got vendors logging in from who knows where. But what about older systems—those legacy devices in OT that weren’t built with any of this in mind? </p>



<p class="has-text-color has-link-color wp-elements-4274a25c0462aa51f77b67fbfca92d4a" style="color:#026f47"><strong>Aaron:</strong> </p>



<p>That’s probably the biggest misconception we hear: “Zero Trust won’t work because my gear is too old.” The truth is, we don’t need the devices themselves to support modern security protocols. </p>



<p>Neeve secures the network layer, not the device layer. We look at the traffic moving between devices, enforce policies at the edge, and isolate anything that shouldn’t be talking. So even if a 20-year-old controller has no encryption, it can still live inside a secure, Zero Trust architecture.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-9faadd921d0d7d4b1f995f15d4d888ee" style="color:#076499"><strong>Greg:</strong> </p>



<p>So it’s not about upgrading all your gear, it’s about controlling what <em>talks</em> to what? </p>



<p class="has-text-color has-link-color wp-elements-6876c322ecd27424276c7a95268b9199" style="color:#026f47"><strong>Aaron:</strong></p>



<p>Exactly. We like to say: protect the flow, not the box. You don’t need to replace every sensor or controller. You just need to know what normal looks like, then put the guardrails in place to make sure it stays that way. </p>



<p class="has-text-color has-link-color wp-elements-9faadd921d0d7d4b1f995f15d4d888ee" style="color:#076499"><strong>Greg:</strong> </p>



<p>Let’s talk monitoring. Zero Trust is all about verification—but what kind of visibility do you need to really make it work? </p>



<p class="has-text-color has-link-color wp-elements-6876c322ecd27424276c7a95268b9199" style="color:#026f47"><strong>Aaron:</strong></p>



<p>You need full telemetry. That’s part of the power of our platform. We offer real-time monitoring of every connection and session—who connected, when, from where, and what they did. That allows us to: </p>



<ul class="wp-block-list">
<li>Spot anomalies quickly, </li>



<li>Detect lateral movement attempts, </li>



<li>And adjust access policies dynamically. </li>
</ul>



<p>It’s especially useful in OT environments where normal behavior is pretty stable. If a lighting controller suddenly starts trying to talk to an elevator PLC? That’s a red flag.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-9faadd921d0d7d4b1f995f15d4d888ee" style="color:#076499"><strong>Greg:</strong> </p>



<p>That kind of real-time insight would be huge for incident response too. Have you seen this deployed in the real world? </p>



<p class="has-text-color has-link-color wp-elements-6876c322ecd27424276c7a95268b9199" style="color:#026f47"><strong>Aaron:</strong></p>



<p>Yeah—one great example is Kilroy Realty. They came to us with growing concerns around remote vendor access and a need to strengthen security across multiple buildings. </p>



<p>We started with a risk assessment, then implemented micro-segmentation and ZTNA. Vendors only got access to the exact systems they needed, with MFA and session limits. All traffic was monitored in real time. No more open VPN tunnels.&nbsp;</p>



<p>The result? Tighter control, better compliance, and no disruptions to building operations.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-9faadd921d0d7d4b1f995f15d4d888ee" style="color:#076499"><strong>Greg:</strong> </p>



<p>That’s the sweet spot—better security, but nothing breaks. So, what are some best practices for firms trying to take this on themselves? </p>



<p class="has-text-color has-link-color wp-elements-4274a25c0462aa51f77b67fbfca92d4a" style="color:#026f47"><strong>Aaron:</strong> </p>



<p>Here’s a simple roadmap we’ve seen work: </p>



<ol start="1" class="wp-block-list">
<li>Start with an asset and communication map. Know what’s connected and how it communicates.</li>
</ol>



<ol start="2" class="wp-block-list">
<li>Segment your network. Start coarse, then work toward micro-segmentation. </li>
</ol>



<ol start="3" class="wp-block-list">
<li>Use role-based access and MFA. Make sure only the right people have access to the right systems. </li>
</ol>



<ol start="4" class="wp-block-list">
<li>Replace VPNs with ZTNA. That alone is a major leap forward. </li>
</ol>



<ol start="5" class="wp-block-list">
<li>Continuously monitor. Know what’s normal so you can spot what’s not. </li>
</ol>



<ol start="6" class="wp-block-list">
<li>Roll out in phases. Don’t try to do the whole network at once. Start where the risk is highest. </li>
</ol>



<p class="has-text-color has-link-color wp-elements-9faadd921d0d7d4b1f995f15d4d888ee" style="color:#076499"><strong>Greg:</strong> </p>



<p>Last question, what do you say to the folks who still think Zero Trust is too expensive or complex? </p>



<p class="has-text-color has-link-color wp-elements-4274a25c0462aa51f77b67fbfca92d4a" style="color:#026f47"><strong>Aaron:</strong> </p>



<p>I’d say they’re not wrong to worry, but they’re probably looking at the wrong solutions. Neeve was built specifically for OT environments, so we focus on using what’s already there. We don’t force forklift upgrades. We integrate gradually, and we secure networks that were never built to be secure. </p>



<p>In most cases, we’re helping organizations improve security <em>without increasing operational cost</em>. That’s the power of doing it right.&nbsp;</p>



<p class="has-text-color has-link-color wp-elements-14b768085aead57f37c870a4b9968d23" style="color:#076499"><strong>Greg:</strong></p>



<p>This has been incredibly helpful, Aaron. For anyone serious about OT cybersecurity, this kind of approach isn’t just smart, it’s necessary. Zero Trust isn’t a buzzword. It’s a technical strategy that works. And with solutions like Neeve, it’s finally accessible to the people who need it. </p>



<p class="has-text-color has-link-color wp-elements-4274a25c0462aa51f77b67fbfca92d4a" style="color:#026f47"><strong>Aaron:</strong> </p>



<p>Appreciate it, Greg. It’s always a pleasure to talk real-world security with someone who gets the OT side. Looking forward to more of these conversations, there’s a lot more ground to cover as this space continues to evolve. </p>



<p>As OT networks become more connected and remote access becomes more common, a Zero Trust architecture, especially one that can be deployed without disrupting legacy systems, is becoming the new standard. With practical tools like Neeve and a phased deployment strategy, cybersecurity is no longer a barrier to smart building innovation. It’s the foundation.&nbsp;</p>
<p>The post <a href="https://www.smartbuildingdesign.com/part-2-diving-deeper-the-technical-realities-of-zero-trust-in-ot-a-conversation-with-neeve/">Part 2: Diving Deeper: The Technical Realities of Zero Trust in OT–A Conversation with Neeve </a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.smartbuildingdesign.com/part-2-diving-deeper-the-technical-realities-of-zero-trust-in-ot-a-conversation-with-neeve/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Part 1: Implementing Zero Trust in Smart Buildings, A Cybersecurity Guide for OT Environments</title>
		<link>https://www.smartbuildingdesign.com/zero-trust-cybersecurity-smart-buildings/</link>
					<comments>https://www.smartbuildingdesign.com/zero-trust-cybersecurity-smart-buildings/#respond</comments>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Fri, 01 Nov 2024 20:27:38 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=3001</guid>

					<description><![CDATA[<p>Explore the principles of Zero Trust and Cyber Harmony for smart building cybersecurity. Learn how consulting engineers and systems integrators can protect OT environments with secure remote access solutions and network segmentation.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/zero-trust-cybersecurity-smart-buildings/">Part 1: Implementing Zero Trust in Smart Buildings, A Cybersecurity Guide for OT Environments</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-black-color has-white-background-color has-text-color has-background has-link-color wp-elements-37e85a60d530f4ca5e46ea9fbb2c20f3">In 2023, the concept of “Cyber Harmony” emerged as a call to action, encouraging industry-wide collaboration among all project stakeholders to establish best practices and standards in cybersecurity.<br><br>As advancements in smart building technology, OT manufacturers’ shift to IP-based devices, and the rise of remote access has become the norm, new vulnerabilities have been introduced into the built environment. Protecting OT systems from cyber threats has never been more critical, and cybersecurity is now a key concern in the construction industry.<br><br>Systems integrators and consulting engineers are increasingly asking how to embed basic cyber hygiene into their designs and deployments, and where to begin. Since remote access is a common entry point for threat actors due to its exposure to the internet, selecting a solution based on best practices is essential.<br><br>The concept of “zero trust,” long established in the IT world, provides a solid foundation when considering remote access solutions for OT environments.<br><br>I recently sat down with Aaron Brondum, Sr. Director Business Development at <a href="https://neeve.ai/">NEEVE</a> (formerly known as VIEW Smart Building Cloud) to discuss the principles of zero trust and how they apply to OT deployments. Read that conversation below.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="595" src="https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix-1024x595.png" alt="" class="wp-image-3002" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix-1024x595.png 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix-300x174.png 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix-768x446.png 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix-1536x892.png 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2024/11/OT-Vulnerability-and-Risk-Matrix.png 1846w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-33888b692da7b663bb45275c0af9c0a0" style="color:#076499">Greg Fitzpatrick, CxA, Business Development Leader, Cochrane Supply:</h4>



<p>Hey, Aaron, thanks so much for sitting down to speak with me. Today I wanted to talk to you about Implementing cybersecurity in smart building design. It’s still kind of a new concept for a lot of consulting engineers and systems integrators. They&#8217;re often working with the owner&#8217;s IT department to integrate smart building technology with an existing IT setup, or they’re setting up a separate OT network. One big question that always comes up from the engineers and integrators is: what’s the best remote access strategy for the standalone OT network? <strong>&#8220;Zero Trust&#8221;</strong> comes up a lot, especially in IT circles, but for people who might not be familiar with it, can you explain what Zero Trust really means and why it’s so critical for remote access?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-56d197166ea6032f473537bd5eaab901" style="color:#026f47">Aaron Brondum, Sr Director Business Development, Neeve:</h4>



<p>Yeah, absolutely. Zero Trust is kind of a game-changer in cybersecurity. You know, the traditional approach is that once you&#8217;re inside the network, you&#8217;re trusted. Zero Trust flips that on its head—it’s more like, “never trust, always verify.” Every single user or device that’s trying to access any resource has to be verified, no matter where they are or how they&#8217;re connecting.</p>



<p>When you apply that to smart buildings, especially with remote access, Zero Trust becomes essential for making sure IT and OT systems—which run things like HVAC and lighting—are communicating securely. Let’s say someone’s trying to access the OT network remotely. With Zero Trust, you’re basically saying, &#8220;Okay, even though you&#8217;re on the network, we&#8217;re still going to verify who you are, what device you&#8217;re on, and whether you&#8217;re authorized to access this specific system.&#8221; It’s an extra layer of protection, especially when you’re dealing with sensitive infrastructure.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>So, it’s not just a blanket trust once you’re in. Every access point gets verified. That makes a lot of sense. And I guess the principle is the same whether you’re dealing with IT or OT networks?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Exactly, but there are some differences in how it&#8217;s applied. For example, in IT, you’ve got your standard devices—laptops, phones—things that already come with built-in security. But in OT, you’re working with legacy systems, like sensors and HVAC controllers that were never really designed with cybersecurity in mind. So, you have to adapt the Zero Trust methods in a way that doesn’t disrupt critical operations.</p>



<p>Another big thing is network segmentation. In IT, you might use more fine-grained access controls based on user roles. In OT, you’re segmenting the network to make sure critical systems are isolated, but still allow necessary communication. It&#8217;s all about understanding the physical processes of the building systems and securing them without shutting anything down.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>Got it. And what are some of the key factors to think about when you&#8217;re specifying a cyber solution for OT? I mean, it’s not just about security, but you’ve got to make sure it&#8217;s easy to deploy and doesn&#8217;t disrupt the operations, right?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-0e70b877b26d1fef2cca73d93c1b6dac" style="color:#026f47">Aaron: </h4>



<p>Yeah, that’s the tricky part—balancing security with ease of deployment. One thing to always keep in mind is segmentation and isolation. You want to make sure that your OT network is separate from the IT network. That way, if there’s a threat in the IT network, it doesn’t spread to critical OT systems like HVAC or elevators.</p>



<p>And then there’s secure remote access. You need strong security, like multi-factor authentication, but also something that integrates Zero Trust principles. A lot of people still rely on VPNs, but the problem with VPNs is that once you’re in, you’ve got access to everything. With Zero Trust, you&#8217;re constantly verifying who’s accessing what.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>What about legacy systems? OT networks are full of older equipment. How do you secure those?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>That’s a huge challenge. A lot of these systems weren’t built with cybersecurity in mind, so you’ve got to choose solutions that can work with what’s already there, without requiring expensive upgrades. It&#8217;s about securing the network layer, rather than trying to retrofit security onto each individual device.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>Makes sense. So, let&#8217;s say the owner wants a separate OT network. Can we look at a solution that gives remote access but with true firewall capabilities?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Yeah, definitely. The key here is placing a Zero Trust solution right at the edge of the OT network. That way, any communication between IT and OT gets verified. You’re basically creating a secure gateway between the two environments. And if you&#8217;re adding remote access, Zero Trust ensures that only authorized users get through, continuously verifying their identity. It&#8217;s like a firewall, but with the added security of constant authentication.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>It sounds like you&#8217;re tightening things up at every level, from the edge to the individual systems. How does a solution like NEEVE’s Zero Trust help with the specific challenges of securing remote connectivity in OT systems?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>And then, there&#8217;s network segmentation again. We create smaller zones within the OT network. So even if someone gets into one area, they can’t jump around and access everything.</p>



<p>NEEVE’s approach is all about continuous identity verification, using things like multi-factor authentication, so it’s not a one-and-done check. Every time someone tries to access the OT system remotely, we verify their identity and the security of their connection. Plus, all the communication is encrypted, so no one&#8217;s snooping in on sensitive data.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>So, even legacy systems are covered under this?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Exactly. A lot of people think Zero Trust can’t work with older OT systems, but that&#8217;s not the case. You’re securing the network and monitoring traffic between devices, so you don’t necessarily need to upgrade every single piece of equipment.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>And what are some of the misconceptions about Zero Trust in OT environments that you run into?</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Oh, there are a few. Some folks think Zero Trust will disrupt their operations or be too complex to implement. But the reality is, if it’s done right, it&#8217;s actually pretty smooth. For example, with NEEVE, we take a step-by-step approach, integrating it into existing infrastructure without causing downtime. It’s all about making the process as seamless as possible.</p>



<p>And there’s this idea that OT devices can’t support Zero Trust, which, again, isn’t true. Even if the devices are older, we secure the network layer to make sure they’re part of the architecture.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>It’s like you’re providing a modern security solution, but without needing to overhaul the whole system. That’s huge for these older setups.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Exactly! And it’s also cost-effective. People think Zero Trust is going to break the bank, but we work with what’s already there, so you can roll it out without a massive upfront investment.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-67f8ffd96fe105cd185810d87ec96bf6" style="color:#076499">Greg:</h4>



<p>This has been super insightful, Aaron. Thanks for breaking it down so clearly. Zero Trust seems like a no-brainer for securing OT networks, especially as they’re becoming more integrated with IT.</p>



<h4 class="wp-block-heading has-text-color has-link-color wp-elements-22daf203fadb8283b85b56c5f6c7a9e0" style="color:#026f47">Aaron:</h4>



<p>Absolutely, Greg. It’s becoming more essential every day, especially as smart buildings and OT environments get more complex. Always a pleasure to chat about this stuff! I&#8217;m looking forward to diving into a more technical level with you next time. </p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>As the integration of IT and OT systems in smart buildings continues to grow, the importance of a robust cybersecurity strategy, grounded in Zero Trust principles, becomes undeniable. By incorporating Cyber Harmony as an industry-wide approach and applying Zero Trust as a guiding framework, consulting engineers and systems integrators can better protect today’s complex built environments. In our next article, we’ll dive deeper into the technical specifics, exploring advanced Zero Trust architectures, practical deployment strategies, and best practices for overcoming real-world challenges in OT cybersecurity. Stay tuned as we uncover how to fortify smart buildings at every layer.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/zero-trust-cybersecurity-smart-buildings/">Part 1: Implementing Zero Trust in Smart Buildings, A Cybersecurity Guide for OT Environments</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.smartbuildingdesign.com/zero-trust-cybersecurity-smart-buildings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Engineer’s &#038; Integrator’s Role in Creating Cyber Harmony</title>
		<link>https://www.smartbuildingdesign.com/the-engineers-integrators-role-in-creating-cyber-harmony/</link>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Tue, 04 Jun 2024 14:20:40 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[buildingautomation]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[cyberharmony]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HVAC]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[operationaltechnology]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2963</guid>

					<description><![CDATA[<p>Originally posted on automatedbuildings.com. Cyber Harmony: A Holistic Approach to Cybersecurity Cyber Harmony is a collaborative framework that ensures all stakeholders involved in a project—engineers, integrators, owners, end-users, and more—are aligned in their understanding and implementation of cybersecurity practices. Key Principles: Implementation Phases: Challenges and Considerations: Recommendations:</p>
<p>The post <a href="https://www.smartbuildingdesign.com/the-engineers-integrators-role-in-creating-cyber-harmony/">The Engineer’s &amp; Integrator’s Role in Creating Cyber Harmony</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Originally posted on<a href="https://www.automatedbuildings.com/2024/05/the-engineers-integrators-role-in-creating-cyber-harmony/"> automatedbuildings.com</a>.</em></p>



<p><strong>Cyber Harmony: A Holistic Approach to Cybersecurity</strong></p>



<p><strong>Cyber Harmony is a collaborative framework that ensures all stakeholders involved in a project—engineers, integrators, owners, end-users, and more—are aligned in their understanding and implementation of cybersecurity practices.</strong></p>



<p><strong>Key Principles:</strong></p>



<ul class="wp-block-list">
<li><strong>Importance:</strong> With the increasing complexity and interconnectedness of IT (Information Technology) and OT (Operational Technology) systems, a harmonized approach to cybersecurity is vital to protect project integrity and data.</li>



<li><strong>Goal:</strong> Embed cybersecurity best practices into every aspect of hardware and software solutions, from initial specifications to final coordination drawings.</li>



<li><strong>Roles and Responsibilities:</strong> Clearly define the roles and responsibilities of each stakeholder in maintaining a secure environment. This includes engineers, integrators, owners, and IT professionals.</li>



<li><strong>Layered Approach:</strong> Combine technology (e.g., encryption, firewalls) with human elements (e.g., training, awareness) for a robust defense.</li>



<li><strong>Early Engagement:</strong> Engage IT professionals early in the project lifecycle to ensure seamless integration of network and security requirements.</li>



<li><strong>Owner’s Project Requirements (OPR):</strong> Develop a comprehensive OPR document that outlines the owner’s cybersecurity expectations and guides the project’s security measures.</li>
</ul>



<p><strong>Implementation Phases:</strong></p>



<ol class="wp-block-list">
<li><strong>Initial Discussions:</strong> Understand the owner’s vision and specific requirements for cybersecurity integration.</li>



<li><strong>Design:</strong> Incorporate cybersecurity measures into the design of both hardware and software solutions.</li>



<li><strong>Commissioning:</strong> Ensure that all security settings are accurate and systems are updated before deployment.</li>



<li><strong>Ongoing Monitoring:</strong> Regularly audit networks, update software, and conduct security drills to identify and address vulnerabilities.</li>
</ol>



<p><strong>Challenges and Considerations:</strong></p>



<ul class="wp-block-list">
<li><strong>Cloud Adoption:</strong> While beneficial, cloud migration requires careful planning, leadership buy-in, and addressing security concerns.</li>



<li><strong>Data Encryption:</strong> Implement strong encryption at all levels to protect sensitive information.</li>



<li><strong>Unauthorized Access:</strong> Employ a multi-layered approach, including firewalls, VPNs, and user access controls.</li>



<li><strong>Backup and Recovery:</strong> Establish a dedicated team and process for regular backups and disaster recovery.</li>



<li><strong>Compliance:</strong> Adhere to industry standards (e.g., ISO 27001) and regulations (e.g., SEC) to ensure compliance and maintain a secure network.</li>
</ul>



<p><strong>Recommendations:</strong></p>



<ul class="wp-block-list">
<li>Consider VPN routers and cellular modems to enhance security and connectivity.</li>



<li>Evaluate both combined appliances and separate components to determine the best fit for the system.</li>



<li>Prioritize regular network audits and security updates.</li>



<li>Integrate information technology asset management (ITAM) to track and manage IT assets effectively.</li>



<li>Foster collaboration between different departments to address cybersecurity challenges collectively.</li>
</ul>
<p>The post <a href="https://www.smartbuildingdesign.com/the-engineers-integrators-role-in-creating-cyber-harmony/">The Engineer’s &amp; Integrator’s Role in Creating Cyber Harmony</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA’s challenge to a major stakeholder in the “Cyber Harmony” Model- The Manufacturer</title>
		<link>https://www.smartbuildingdesign.com/cisa-challenge-to-a-major-stakeholder-in-the-cyber-harmony/</link>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Sat, 20 Jan 2024 02:47:23 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[buildingautomation]]></category>
		<category><![CDATA[contractors]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HVAC]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[operationaltechnology]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2828</guid>

					<description><![CDATA[<p>CISA issues request for information urging software manufacturers to prioritize "Cyber Harmony".</p>
<p>The post <a href="https://www.smartbuildingdesign.com/cisa-challenge-to-a-major-stakeholder-in-the-cyber-harmony/">CISA’s challenge to a major stakeholder in the “Cyber Harmony” Model- The Manufacturer</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In our pursuit of increased collaboration among construction, facilities, and IT, it becomes crucial for all stakeholders, including software manufacturers deploying products in the built environment, to integrate security features into their offerings.  The <a href="https://www.smartbuildingdesign.com/cybersecurity-awareness-2023-achieve-cyberharmony-with-smartbuildingdesign/" target="_blank" rel="noreferrer noopener">&#8220;Cyber Harmony&#8221;</a> model reveals that manufacturers play a pivotal role among the key stakeholders, contributing significantly to the industry&#8217;s progression toward achieving genuine Cyber Harmony.<br><br>In late December 2023, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) <a href="https://www.cisa.gov/news-events/news/cisa-issues-request-information-secure-design-software-whitepaper" target="_blank" rel="noreferrer noopener">issued a Request for Information (RFI)</a> to gather insights on secure-by-design software practices. This initiative aligns with the agency&#8217;s ongoing global campaign, urging software manufacturers to prioritize secure design and revamp their development programs.  Although there is a push for cybersecurity awareness throughout commercial real estate and all of its stakeholders, I believe that we can all agree that a push for manufacturers to develop more secure devices is a great start.</p>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading">Some The Key Points:</h4>



<ul class="wp-block-list">
<li>CISA&#8217;s RFI, published in the Federal Register, seeks information to enhance its Secure by Design campaign.</li>



<li>Topics include integrating security early into the software development life cycle (SDLC), education, recurring vulnerabilities, AI, operational technology (OT), and addressing the economics of secure design.</li>



<li>CISA emphasizes the need for diverse perspectives and feedback to strengthen its campaign.</li>



<li>The President&#8217;s National Cybersecurity Strategy calls for a shift in security responsibility from customers to software manufacturers.</li>



<li>Co-sealed by 18 U.S. and international agencies, CISA&#8217;s Secure by Design guidance aims to reduce cybersecurity burdens on customers.</li>



<li>The RFI seeks feedback on effective security tactics in the SDLC, with a focus on smaller software manufacturers struggling to implement robust practices.</li>



<li>Input is requested on examples of educational initiatives linking commercial entities, universities, and online programs to enhance security knowledge.</li>



<li>CISA inquires about the costs incurred by manufacturers in developing secure-by-design products and seeks information on how vulnerabilities impact both manufacturers and customers.</li>



<li>The RFI addresses customer perceptions of security and explores ways customers request secure products.</li>



<li>Recurring vulnerabilities are a focal point, with CISA seeking input on barriers to elimination and changes to CVE and CWE programs.</li>



<li>Threat modeling, especially in OT systems, is highlighted, seeking examples of public threat models and best practices for demonstrating robust threat modeling programs.</li>



<li>CISA urges manufacturers and stakeholders to provide written comments by Feb. 20, 2024, to inform future iterations of their whitepaper and collaborative efforts with the global community.</li>
</ul>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<p>In conclusion, the information gathered through CISA&#8217;s Request for Information (RFI) serves as a crucial resource for enhancing the cybersecurity of Operational Technology (OT) deployments. By addressing key areas such as integrating security into the software development life cycle, education, recurring vulnerabilities, and threat modeling in OT systems, the insights obtained can guide the development of more cyber-secure OT solutions. </p>



<p>The emphasis on diverse perspectives, feedback from manufacturers, and understanding the economic aspects of secure design contributes to a comprehensive approach. Ultimately, this initiative facilitates the creation of robust, secure-by-design OT deployments, aligning with CISA&#8217;s global campaign to reduce cybersecurity burdens on customers and foster a safer technological landscape.</p>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background"/>



<div style="height:33px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-center" style="grid-template-columns:25% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="830" height="800" src="https://www.smartbuildingdesign.com/wp-content/uploads/2022/03/Greg-Fitzpatrick-e1705719710545.jpg" alt="" class="wp-image-882 size-full" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2022/03/Greg-Fitzpatrick-e1705719710545.jpg 830w, https://www.smartbuildingdesign.com/wp-content/uploads/2022/03/Greg-Fitzpatrick-e1705719710545-300x289.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2022/03/Greg-Fitzpatrick-e1705719710545-768x740.jpg 768w" sizes="(max-width: 830px) 100vw, 830px" /></figure><div class="wp-block-media-text__content">
<p class="has-text-align-left">Greg is currently the Business Development Leader for Building IoT and Integration for Cochrane Supply &amp; Engineering. In 2022, Greg was was appointed to the role of Executive Director for the Real Estate Cyber Consortium (RECC), promoting “cyber harmony” through leadership and insight on best practices, policies, and procedures for real estate owners, operators, and solution providers.</p>
</div></div>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>
<p>The post <a href="https://www.smartbuildingdesign.com/cisa-challenge-to-a-major-stakeholder-in-the-cyber-harmony/">CISA’s challenge to a major stakeholder in the “Cyber Harmony” Model- The Manufacturer</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Awareness 2023: Achieving Cyber Harmony in a Fragmented Industry</title>
		<link>https://www.smartbuildingdesign.com/cybersecurity-awareness-2023-achieve-cyberharmony-with-smartbuildingdesign/</link>
		
		<dc:creator><![CDATA[Greg Fitzpatrick]]></dc:creator>
		<pubDate>Thu, 05 Oct 2023 19:08:16 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[buildingautomation]]></category>
		<category><![CDATA[buildingcontrols]]></category>
		<category><![CDATA[commercial realestate]]></category>
		<category><![CDATA[contractors]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurityawarenessmonth]]></category>
		<category><![CDATA[HVAC]]></category>
		<category><![CDATA[IOT]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2778</guid>

					<description><![CDATA[<p>Cybersecurity Awareness 2023: Achieving Cyber Harmony in fragmented industry. Ensuring strong cybersecurity for any OT Network.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/cybersecurity-awareness-2023-achieve-cyberharmony-with-smartbuildingdesign/">Cybersecurity Awareness 2023: Achieving Cyber Harmony in a Fragmented Industry</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>By Greg Fitzpatrick, CxA | Business Development | Cochrane Supply &amp; Engineering</strong></p>



<p>For the past five years, I&#8217;ve traveled across the country, engaging in discussions with consulting engineers about the integration of IP technology into their smart building designs. &nbsp;In most cases, I&#8217;ve found that these firms are enthusiastic about incorporating IP Technology into their strategies.</p>



<p>In June 2023, I authored an article for Realcomm&#8217;s Edge Magazine titled &#8220;<a href="https://www.realcomm.com/news/1143/1/real-estate-cyber-consortium-recc-creating-a-path-to-cyber-harmony-challenging-cres-supply-chain" target="_blank" rel="noreferrer noopener">Creating A Path To Cyber Harmony &#8211; Challenging Commercial Real Estate&#8217;s Supply Chain</a>,” where I briefly emphasize the significance of cyber awareness for commercial real estate owners and all project stakeholders, including consulting engineers.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="746" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-1024x746.jpg" alt="" class="wp-image-2808" style="aspect-ratio:16/9;object-fit:cover" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-1024x746.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-300x218.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-768x559.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-1536x1119.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/cyberharmony_graphic-2048x1492.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>While IP technology holds immense potential for smart building design, its implementation introduces new challenges in terms of cybersecurity and potential risks for consulting engineers. The consulting engineering community must recognize that <a href="https://cybersecuritynews.com/key-features-of-a-unified-ot-cyber-security-framework/" target="_blank" rel="noreferrer noopener">cybersecurity is pivotal in deploying Operational Technology (OT)</a> during the construction process.</p>



<p>OT systems, such as building automation and control systems, are increasingly interconnected and susceptible to <a href="https://www.cybersecuritydive.com/" target="_blank" rel="noreferrer noopener">cyber threats</a>. The recent cyberattacks to <a href="https://www.cybersecuritydive.com/news/mgm-resorts-investigates-cyberattack/693351/" target="_blank" rel="noreferrer noopener">MGM &amp; Caesars properties in Las Vegas</a>, and to <a href="https://www.cybersecuritydive.com/news/johnson-controls-ransomware-attack/695130/" target="_blank" rel="noreferrer noopener">building controls manufacturers,</a> underscore the urgency of addressing cyber risks in the construction industry.</p>



<p>Robust cybersecurity measures safeguard not only sensitive construction data but also the physical infrastructure. This protection prevents potential disruptions, unauthorized access, or sabotage, ensuring the safety, efficiency, and integrity of construction projects. But, as we are experiencing, these devices are limited for shielding against the growing sophistication of the costly ransomware of today’s hackers.</p>



<p>Concentrated threats to properties and controls manufacturers are alarming, and with SEC’s approval of new cybersecurity disclosure rules, consulting engineers must elevate their cyber awareness and comprehend how to incorporate the necessary hardware and software to address cybersecurity concerns in their designs and specifications.</p>



<h2 class="wp-block-heading">Cybersecurity Expertise to Achieve &#8220;Cyber Harmony&#8221;</h2>



<p>With over 30 years in the consulting industry my aim has always been to simplify the process of designing and specifying OT and integration, making it as clear and concise as possible. Cybersecurity is no exception. </p>



<div class="wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow">
<p>Earlier this year I accepted the role as the Executive Director of the <a href="https://reccinc.org/" target="_blank" rel="noreferrer noopener">Real Estate Cyber Consortium (RECC)</a>, where I&#8217;m striving to foster a movement towards <a href="https://www.smartbuildingdesign.com/real-estate-cyber-consortium-recc-creating-a-path-to-cyber-harmony/" target="_blank" rel="noreferrer noopener">&#8216;Cyber Harmony&#8217;</a> across the industry.</p>



<p>It is important to bridge the gap between facilities and IT departments, and implementing internal OT teams. My goal is to achieve “Cyber Harmony” through increased collaboration among diverse stakeholders, promoting activities such as knowledge sharing, best practice documentation, podcasts, and other communication channels to ultimately develop best practices and standards for the industry.</p>
</div>



<div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow">
<figure class="wp-block-image alignright size-large is-resized"><img loading="lazy" decoding="async" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-1024x1024.jpg" alt="" class="wp-image-2797" style="width:303px;height:303px" width="303" height="303" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-1024x1024.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-300x300.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-150x150.jpg 150w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-768x768.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-1536x1536.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/10/Greg_Quote_Realcomm_Edge-2048x2048.jpg 2048w" sizes="(max-width: 303px) 100vw, 303px" /></figure>
</div>
</div>



<p>My objective is to streamline the fundamental cybersecurity requirements for consulting engineers, making these principles an integral part of the designer&#8217;s drawings and specifications when creating construction documents for building systems.</p>



<p>In any given project, there is typically a discovery phase where the designer must ask essential questions before proceeding. Incorporating cybersecurity into your design follows a similar pattern. Here are some key points to clarify during the discovery phase to determine your cybersecurity strategy:</p>



<p>1. Determine whether you are deploying IP devices on the owner&#8217;s network or designing a separate OT network that supports various building technologies. If the owner manages all OT, the designer&#8217;s responsibility is to ensure data encryption, while firewalls and VPN strategy fall under the owner&#8217;s IT department.</p>



<p>2. If the designer is responsible for a separate OT network, they must understand how to incorporate cybersecurity into the design.</p>



<h2 class="wp-block-heading">Strategy First: Planning for Cybersecurity is Paramount</h2>



<p>When considering essential design prerequisites for cybersecurity in your OT Network, assuming the owner prefers complete separation of the OT from their IT network (air gapped), I recommend these four tips:</p>



<p>1. Ensure that the specified OT Network solution offers robust port security capabilities, both in software and through the ability to bind device MAC addresses. This is critical to safeguard against unauthorized access. Optigo provides an OT network solution with the necessary port security and unified management through a user-friendly interface.</p>



<p>2. Implement robust data encryption mechanisms for network traffic, which can be achieved through various methods, including BAS system web supervisors, dedicated gateway devices, or BACnet Secure Connect (BACnet SC) using Tridium&#8217;s Niagara. This ensures data confidentiality and protection against threats.</p>



<p>3. Prioritize security when facilitating remote access to the network via the internet. Specify a firewall solution and establish a secure Virtual Private Network (VPN) appliance and strategy for remote access. This multi-layered approach enhances network security.</p>



<p>4. Collaborate with the end user on a VPN strategy for remote access and select a secure VPN appliance. TosiBox offers a product known for its ease of deployment and security features, popular among systems integrators.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Realcomm IBcon 2023: CRE Cybersecurity Forum - Hosted by Greg Fitzpatrick" width="800" height="450" src="https://www.youtube.com/embed/dHbUGuuxbv0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div><figcaption class="wp-element-caption">Watch this recap of the CRE Cybersecurity Forum from Realcomm IBcon 2023 hosted by Greg Fitzpatrick.</figcaption></figure>



<h2 class="wp-block-heading">Incorporating Your Cybersecurity Strategy into Your Construction Documents</h2>



<p>Once a cybersecurity strategy is determined for our design, the question often arises: &#8220;How do I incorporate cybersecurity into my construction documents?</p>



<p>As a general practice, it&#8217;s wise to include as much detail as possible on your drawings and provide further clarification in the specifications. I advocate for the use of a detailed &#8220;<a href="https://www.smartbuildingdesign.com/system-architecture/" target="_blank" rel="noreferrer noopener">Systems Integration Drawing</a>&#8221; as the foundation for conveying intent to the master systems integrator (MSI). This drawing should display the OT network layout and the hardware used in your cybersecurity strategy.</p>



<p><strong>The use of this drawing allows the designer show:</strong></p>



<ul class="wp-block-list">
<li>Deployment location of the supervisory software</li>



<li>VPN hardware/software</li>



<li>Cell Modem</li>



<li>Firewall</li>



<li>OT Network router</li>



<li>OT Network management switch(s)</li>



<li>OT Network media</li>



<li>IP switch types and locations</li>



<li>Gateway devices</li>



<li>Server (where applicable)</li>



<li>Subnetwork media</li>



<li>Technology being integrated</li>



<li>OT Network MDF location and installed hardware</li>
</ul>



<h2 class="wp-block-heading">SmartBuildingDesign.com has the resources to help you need for ensuring strong cybersecurity for any OT Network</h2>



<p>At SmartBuildingDesing.com we have detailed Systems Integration Drawings available here: <a href="https://www.smartbuildingdesign.com/system-architecture/" target="_blank" rel="noreferrer noopener">https://www.smartbuildingdesign.com/system-architecture/</a></p>



<p>Regarding specifications, I recommend using Division 25 &#8211; Integrated Automation as the section for hardware and software related to your cybersecurity strategy. Examples of Division 25 specifications are available on our <a href="https://www.smartbuildingdesign.com/guide-specifications/">Guide Specifications</a> page.</p>



<p>Incorporating these measures into your OT Network design not only reduces your risk as a designer but significantly enhances your client&#8217;s cybersecurity posture, reducing vulnerabilities and ensuring the safety and integrity of their critical operations.</p>



<p><strong>Greg Fitzpatrick, CxA<br></strong>Business Development Leader- IoT and Integration, Cochrane Supply and Engineering<br>Executive Director, Real Estate Cyber Consortium</p>
<p>The post <a href="https://www.smartbuildingdesign.com/cybersecurity-awareness-2023-achieve-cyberharmony-with-smartbuildingdesign/">Cybersecurity Awareness 2023: Achieving Cyber Harmony in a Fragmented Industry</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Real Estate Cyber Consortium (RECC): Creating a Path to Cyber Harmony</title>
		<link>https://www.smartbuildingdesign.com/real-estate-cyber-consortium-recc-creating-a-path-to-cyber-harmony/</link>
		
		<dc:creator><![CDATA[wpAdmin]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 17:51:03 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[buildingautomation]]></category>
		<category><![CDATA[buildingcontrols]]></category>
		<category><![CDATA[commercial realestate]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[Realcomm]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2740</guid>

					<description><![CDATA[<p>Greg Fitzpatrick had the opportunity to provide an article reintroducing RECC to the Realcomm community.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/real-estate-cyber-consortium-recc-creating-a-path-to-cyber-harmony/">Real Estate Cyber Consortium (RECC): Creating a Path to Cyber Harmony</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Realcomm recently published their Summer 2023 edition of Edge Magazine and Greg Fitzpatrick had the opportunity to provide an article reintroducing RECC to the Realcomm community and outlining how we achieve CYBER HARMONY in the commercial real estate industry and throughout its supply chain. </p>



<p>Here are 10 of the main take-aways from his article:</p>



<ul class="wp-block-list">
<li>Real Estate Cyber Consortium (RECC) was formed in 2016 to address rising cyber threats in commercial real estate.</li>



<li>RECC is a leading force in driving cybersecurity standards for the built environment.</li>



<li>RECC represents over 45 organizations responsible for 12.5 billion sq. ft. of property management worldwide.</li>



<li>RECC&#8217;s leadership board meets monthly to share insights on best practices and industry trends.</li>



<li>2023&#8217;s hot topics include network monitoring tools, risk frameworks, incident response plans, and integrating cyber into construction.</li>



<li>Focus on the effect of operational technology (OT) on managing and securing built environments.</li>



<li>Goal is to achieve &#8220;Cyber Harmony&#8221; through collaboration and adoption of best practices and specifications.</li>



<li>There is a need for thought leaders to come together from various disciplines in the industry.</li>



<li>It is important to bridge the gap between facilities and IT departments and implementing internal OT teams.</li>



<li>The industry need to collectively develop a commercial real estate OT playbook, with advancements in technology and industry protocols.</li>
</ul>



<p><a href="https://www.realcomm.com/edge/issues/2023-07/#p=34" target="_blank" rel="noreferrer noopener">Read Full Article Here</a></p>
<p>The post <a href="https://www.smartbuildingdesign.com/real-estate-cyber-consortium-recc-creating-a-path-to-cyber-harmony/">Real Estate Cyber Consortium (RECC): Creating a Path to Cyber Harmony</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Realcomm &#124; IBcon 2023 Recap: Creating Cyber Harmony in Commercial Real Estate and Its Supply Chain</title>
		<link>https://www.smartbuildingdesign.com/realcomm-ibcon-recap-2023/</link>
		
		<dc:creator><![CDATA[wpAdmin]]></dc:creator>
		<pubDate>Thu, 29 Jun 2023 13:13:48 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[buildingautomation]]></category>
		<category><![CDATA[buildingcontrols]]></category>
		<category><![CDATA[commercial realestate]]></category>
		<category><![CDATA[contractors]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HVAC]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[Realcomm]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2628</guid>

					<description><![CDATA[<p>Greg Fitzpatrick joined RealComm &#124; IBcon 2023 leading the Real Estate Cyber Consortium's Cybersecurity Forum and other educational sessions.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/realcomm-ibcon-recap-2023/">Realcomm | IBcon 2023 Recap: Creating Cyber Harmony in Commercial Real Estate and Its Supply Chain</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1-1024x578.jpg" alt="Greg Fitzpatrick standing on stage at Realcomm IBcon 2023 for the Cybersecurity Forum" class="wp-image-2629" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1-1024x578.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1-768x434.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1-1536x867.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/Greg_Fitzpatrick_Realcomm_Cybersecurity_Forum_1.jpg 1934w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>This year marked my first attendance at the RealComm | IBCon Conference, and I must say that describing it as exciting would be an understatement.<br><br><a href="https://www.realcomm.com/realcomm-2023/" target="_blank" rel="noreferrer noopener">RealComm | IBcon 2023</a> commemorated its 25th anniversary from June 13-15 in Las Vegas. The 3-day commercial real estate technology conference commenced with a day of pre-conference programs, where I led the day off with The <a href="https://reccinc.org/" target="_blank" rel="noreferrer noopener">Real Estate Cyber Consortium&#8217;s</a> CRE Cybersecurity Forum.<br><br>Beginning at 9:00 am Tuesday morning, the <a href="https://www.realcomm.com/realcomm-2023/pre-con/event/cybersecurity-forum/" target="_blank" rel="noreferrer noopener">CRE Cybersecurity Forum</a> was eagerly anticipated by industry experts, professionals, and thought leaders, with few seats left unfilled. The session fostered discussions on the ever-evolving landscape of cybersecurity in real estate and technology. </p>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681.jpg"><img loading="lazy" decoding="async" width="1024" height="583" data-id="2663" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-1024x583.jpg" alt="" class="wp-image-2663" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-1024x583.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-300x171.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-768x437.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-1536x875.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4681-2048x1167.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="634" data-id="2661" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-1024x634.jpg" alt="" class="wp-image-2661" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-1024x634.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-300x186.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-768x476.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-1536x952.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4624-2048x1269.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2665" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-1024x576.jpg" alt="" class="wp-image-2665" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4628-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="768" data-id="2667" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-1024x768.jpg" alt="" class="wp-image-2667" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-1024x768.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-300x225.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-768x576.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-1536x1152.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4451-2048x1536.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2668" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-1024x576.jpg" alt="" class="wp-image-2668" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4459-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568.jpg"><img loading="lazy" decoding="async" width="1024" height="595" data-id="2669" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-1024x595.jpg" alt="" class="wp-image-2669" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-1024x595.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-300x174.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-768x446.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-1536x893.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4568-2048x1190.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
</figure>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<p>We covered a wide range of topics, from nation state threats to the integration of cyber measures into the construction process. With an engaged audience of approximately 300 people, the session generated valuable takeaways. It was both an honor to host and participate in the event&#8217;s discussions.</p>



<p>Check out some highlights from &#8220;Integrating Cyber into New Construction and Commissioning Across Asset Classes&#8221; with <a href="https://www.linkedin.com/in/thano/" target="_blank" rel="noreferrer noopener">Thano Lambrinos</a> of <a href="https://www.quadreal.com/" target="_blank" rel="noreferrer noopener">QuadReal Property Group</a> and <a href="https://www.linkedin.com/in/fredgordy/" target="_blank" rel="noreferrer noopener">Fred Gordy</a> of  <a href="https://mbakerintl.com/en/" target="_blank" rel="noreferrer noopener">Michael Baker International</a>.</p>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Realcomm IBcon 2023: CRE Cybersecurity Forum - Hosted by Greg Fitzpatrick Hosts" width="800" height="450" src="https://www.youtube.com/embed/dHbUGuuxbv0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Throughout the conference, the vendor showroom buzzed with activity, featuring special interviews on the RealComm Live stage. I was ecstatic with overall traffic the RECC booth attracted while I shared the exhibit floor with some of the top manufacturers in the building controls industry showing the latest automated business solutions and state-of-the-art enterprise technologies tailored for the commercial and corporate real estate industry. </p>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="768" data-id="2656" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-1024x768.jpg" alt="" class="wp-image-2656" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-1024x768.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-300x225.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-768x576.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-1536x1152.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4668-2048x1536.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2651" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-1024x576.jpg" alt="" class="wp-image-2651" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4678-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2655" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-1024x576.jpg" alt="" class="wp-image-2655" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4679-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2664" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-1024x576.jpg" alt="" class="wp-image-2664" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4655-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692.jpg"><img loading="lazy" decoding="async" width="1024" height="570" data-id="2653" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-1024x570.jpg" alt="" class="wp-image-2653" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-1024x570.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-300x167.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-768x427.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-1536x855.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4692-2048x1139.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<figure class="wp-block-image size-large"><a href="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" data-id="2650" src="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-1024x576.jpg" alt="" class="wp-image-2650" srcset="https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-1024x576.jpg 1024w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-300x169.jpg 300w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-768x432.jpg 768w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-1536x864.jpg 1536w, https://www.smartbuildingdesign.com/wp-content/uploads/2023/06/IMG_E4650-2048x1152.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
</figure>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<p>On the third day, I had the pleasure of leading an OT Network Design and Configuration Workshop, as one of the final sessions of the entire conference. Despite my initial expectations of a lightly attended session, the room was packed with an enthusiastic audience, eager to ask questions and share their experiences. By the workshop&#8217;s conclusion, participants had gained practical knowledge and skills necessary to effectively configure and manage OT networks. This newfound expertise enables them to enhance operational efficiency, resilience, and cybersecurity within their respective real estate organizations.<br><br>RealComm 2023 was brimming with countless memorable moments, leaving a lasting impact on both myself and the attendees. The industry will undoubtedly continue buzzing until 2024, when we come together once again for another remarkable event!<br><br><strong>Greg Fitzpatrick, CxA<br></strong>Business Development Leader- IoT and Integration, Cochrane Supply and Engineering<br>Executive Director, Real Estate Cyber Consortium</p>
<p>The post <a href="https://www.smartbuildingdesign.com/realcomm-ibcon-recap-2023/">Realcomm | IBcon 2023 Recap: Creating Cyber Harmony in Commercial Real Estate and Its Supply Chain</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Interview: Greg Fitzpatrick joins Eric Stromquist of ControlTrends Podcast (6/9/2023)</title>
		<link>https://www.smartbuildingdesign.com/greg-controltrends-interview-6-9-23/</link>
		
		<dc:creator><![CDATA[wpAdmin]]></dc:creator>
		<pubDate>Fri, 09 Jun 2023 13:57:42 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=2429</guid>

					<description><![CDATA[<p>Greg Fitzpatrick talks with Eric Stromquist about launching smartbuildingdesign.com to help provide resources and best practices for smart building and building automation controls and control networks.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/greg-controltrends-interview-6-9-23/">Interview: Greg Fitzpatrick joins Eric Stromquist of ControlTrends Podcast (6/9/2023)</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Greg Fitzpatrick from Cochrane Supply and Engineering joined <a href="https://controltrends.org/" target="_blank" rel="noreferrer noopener">Eric Stromquist of ControlTrends</a> for <a href="https://controltrends.org/hvac-smart-building-controls/building-automation-and-integration/06/building-automation-controls-exploring-ip-controls-cybersecurity-and-best-practices/" target="_blank" rel="noreferrer noopener">Episode 415 of Controltalk Now</a>. In this episode, they discussed various topics related to building automation controls and control networks. </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="#415 Building Automation Controls: Exploring IP Controls, Cybersecurity, and Best Practices" width="800" height="450" src="https://www.youtube.com/embed/9sRj7ezMhqc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>



<p>Here are some key points mentioned during the conversation:</p>



<ol class="wp-block-list">
<li><strong>Greg’s role:</strong>&nbsp;Greg mentioned that he works with consulting engineers to help them understand and write specifications based on new technologies and network requirements in building automation controls.</li>



<li><strong>New website for consulting engineers</strong>: Cochrane Supply is launching a new website specifically for consulting engineers. This website will provide resources and best practices for smart building and building automation controls and control networks.</li>



<li><strong>Differences between IP controls and traditional controls</strong>: Greg talked about the shift towards&nbsp;<a href="https://controltrends.org/hvac-smart-building-controls/controltrends-news/featured/02/how-ip-controls-are-changing-building-automation-controls/">IP controls</a>&nbsp;and more IoT-type technologies. He discussed the differences between<a href="https://controltrends.org/hvac-smart-building-controls/by-vendor/honeywell-post-by-vendor/11/honeywells-new-ciper-next-generation-ip-controller-line-is-a-game-changer-in-the-building-automation-industry/">&nbsp;IP (Internet Protocol)</a>&nbsp;and MSTP (Master-Slave/Token-Passing) and highlighted the importance of understanding IP network solutions for the facility world.<a href="https://controltrends.org/lets-create-some-marketing-magic-and-grow-your-business/"></a></li>



<li><strong>Basic design principles for IP networks</strong>: Greg mentioned the importance of following basic design principles when setting up an IP network for building automation. This ensures a reliable and secure network infrastructure.</li>



<li><strong>Consultants as trusted advisors:</strong>&nbsp;Greg emphasized the&nbsp;<a href="https://controltrends.org/hvac-smart-building-controls/building-automation-and-integration/07/newcomb-and-boyd-at-2017-realcommibcon/">role of consulting engineers a</a>s trusted advisors. They play a crucial role in guiding clients and helping them make informed decisions regarding open systems and new technologies.</li>



<li><strong>Evolution of consulting engineering</strong>: The discussion touched upon the evolving nature of consulting engineering, moving from one-to-one interactions to a more comprehensive and consultative approach.</li>



<li><strong>Importance of consulting engineers</strong>: Greg highlighted the significance of consulting engineers and their contributions to the industry. He shared his own experience working for a small firm in the early 90s and the value consultants bring to projects.<a href="https://controltrends.org/lets-create-some-marketing-magic-and-grow-your-business/"></a></li>



<li><strong>Greg’s roadshow and ICcon:</strong>&nbsp;Greg talked about his roadshow, which is different from the early days of building automation controls. He also mentioned his upcoming involvement at ICcon (presumably an industry conference) and the cyber forum scheduled for the event.</li>



<li><strong>Cybersecurity and real estate industry</strong>: The concept of “cyber harmony” was discussed in relation to the real estate industry.&nbsp;<a href="https://controltrends.org/hvac-smart-building-controls/controltrends-news/featured/05/episode-413-cybersecurity-unleashed-the-ai-revolution-in-protecting-infrastructure/">Best practice groups</a>&nbsp;and the Real Estate Cyber Consortium were mentioned as initiatives focused on promoting cybersecurity in the industry.</li>



<li><strong>Continuous learning and expertise</strong>: Greg emphasized the importance of staying relevant and understanding what an expert looks like, even if one may not be an expert in every aspect. Continuous learning and awareness of industry trends are key.</li>
</ol>



<p>We want to thank Eric for having Greg on his show to share his expertise and knowledge. </p>
<p>The post <a href="https://www.smartbuildingdesign.com/greg-controltrends-interview-6-9-23/">Interview: Greg Fitzpatrick joins Eric Stromquist of ControlTrends Podcast (6/9/2023)</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NEW IP Technology is being deployed in BAS projects today</title>
		<link>https://www.smartbuildingdesign.com/new-ip-technology-is-being-deployed-in-bas-projects-today/</link>
		
		<dc:creator><![CDATA[Alicia Greene]]></dc:creator>
		<pubDate>Tue, 04 Oct 2022 15:21:19 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<guid isPermaLink="false">https://www.smartbuildingdesign.com/?p=1612</guid>

					<description><![CDATA[<p>Greg Fitzpatrick interviews Limbach Company about the NEW IP Technology being deployed in BAS projects today.</p>
<p>The post <a href="https://www.smartbuildingdesign.com/new-ip-technology-is-being-deployed-in-bas-projects-today/">NEW IP Technology is being deployed in BAS projects today</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Interviewer:</strong></p>



<figure class="wp-block-image"><img decoding="async" src="https://www.automatedbuildings.com/wp-content/uploads/2022/09/Greg-Fitzpatrick_1-300x300.jpg" alt="" class="wp-image-2107"/></figure>



<h3 class="wp-block-heading">Greg Fitzpatrick, CxA</h3>



<p>Business Development Leader- IoT and Integration-Cochrane Supply and Engineering</p>



<p><strong>Interviewed:</strong></p>



<p>The BAS Team from Limbach Company Pontiac, MI.</p>



<ul class="wp-block-list">
<li>John Glaeser – Controls Group Manager&nbsp;</li>



<li>Ernie Bristle</li>



<li>Chris Panek</li>



<li>Kody Immink</li>



<li>Irawat Singh</li>



<li>Rob Melvin</li>
</ul>



<p>One of the things that always helps with establishing best practices in any industry, is a deep dive into lessons learned.&nbsp;&nbsp;When exploring the world of IP technology and OT networks, there are several areas of deployment that can present a learning curve.&nbsp;&nbsp;I had the pleasure of speaking with the controls group at Limbach Company about some of their experiences while deploying this new technology.</p>



<p>1.&nbsp;&nbsp;<strong>GREG:&nbsp;</strong>How long has Limbach been exploring the possible use of IP devices and what made you comfortable in deploying these devices and their supporting networks in your customer’s buildings, considering that this technology is still new to the industry?</p>



<p><strong>Ernie:&nbsp; Over the course of the last two years we have seen the interest grow, more so with our new construction projects. It has been mostly a customer-driven request.</strong></p>



<p><strong>John:&nbsp; We have also had situations in existing buildings where the existing MSTP network was not in the area where we needed to add a device but extending the IP network was a much easier and cost-effective option.</strong></p>



<p><strong>Kody: Our control</strong>&nbsp;division at Limbach has been considering the use of IP-based controllers since their inception. The determining factor has always been either the design specification or the customer’s preference. We have influence over this decision on a case-by-case<strong>&nbsp;basis. In general, we prefer the use of IP controllers for primary equipment (AHUs, Plant Controllers, primary systems, etc.)</strong></p>



<p>2.&nbsp;<strong>GREG:&nbsp;</strong>According to technical documentation everywhere, we know that BacNet over IP devices can be up to 1,000 times faster than the fastest MS/TP devices.&nbsp; As an MSI how have you found this increase in communication speed to benefit the overall performance of the network and the Building Management System?</p>



<p><strong>Ernie: There is a better response time to accessing the information from IP Based devices.&nbsp; The one</strong>&nbsp;area that still needs improvement<strong>&nbsp;is with Distech’s Envysion software.&nbsp; Its graphical interface doesn’t load quickly.&nbsp; The ability to take advantage of the increased communication speed depends on the underlying network layout and topology.</strong></p>



<p><strong>Rob: Programming devices and downloading controllers is much quicker and easier with IP networks and devices.&nbsp; It cuts down on programming and commissioning time.</strong></p>



<p><strong>Chris: Having greater control over the BMS network installation provided a number of benefits on a new construction project.&nbsp; We were able to have the network ready to go for commissioning and for running and monitoring temporary heating and cooling.&nbsp;</strong></p>



<p><strong>Kody: We primarily see the benefits of this speed increase when it comes to programming and commissioning. The</strong>&nbsp;substantial speed increase allows our control technicians to tune PID loops and control logic at a faster pace. We are also able to tune the BACnet network for faster polling when utilizing IP-based<strong>&nbsp;controllers. This allows for more responsive graphics and trend charts.</strong></p>



<p>3.&nbsp;<strong>GREG:&nbsp;</strong>We know that BacNet MS/TP devices are supported by an RS/485 network, unlike IP devices that are supported by an IP/OT network.&nbsp; How would you describe your installation group’s experience with designing, deploying, and commissioning an&nbsp;<strong>IP network</strong>………&nbsp; Has it been a major learning curve?&nbsp; If so, has the learning curve been worth it to your company considering you’re now able to provide the latest technology to your customers?</p>



<p><strong>Ernie: I cannot speak of new installations. However, the site that I have been working on already was using IP Based equipment and we are replacing it. No real learning curve there.&nbsp; As an experienced IT person, I have found the customer’s existing IP infrastructure can be improved for more efficiency and fewer single point of failure.</strong></p>



<p><strong>Kody: We have had tremendous success when installing a dedicated OT network. The use of Optigo Network’s fiber optic technology has allowed us to program, integrate and commission our systems at a faster pace. It also allows us to be more agile and responsive to our customer’s future requests. Having the ability to add IP devices, assign IP addresses, create VLANs,</strong>&nbsp;and secure switch ports on an OT network has proved to be extremely beneficial for<strong>&nbsp;new and existing projects.</strong></p>



<p>4.&nbsp;<strong>GREG:&nbsp;</strong>I’ve talked to a few MSIs across the country and they say that programming and commissioning&nbsp;<strong>IP devices</strong>&nbsp;is much faster than MS/TP devices and that they have experienced significant labor savings.&nbsp; Has Limbach gotten to the point where you see those benefits?&nbsp; Either way can explain the feedback that you are getting from your installation group regarding the differences between the two devices.</p>



<p><strong>Ernie: Based on using Distech IP-based equipment, I can see the quick response while commissioning the controllers.</strong></p>



<p><strong>Kody: IP-based controllers are absolutely faster in regards to programming and commissioning. The responsiveness and faster update times when making changes to the control logic is an absolute game changers.</strong></p>



<p>5.&nbsp;GREG: Do feel like your experience with deploying IP/OT networks will make your company that much savvier when attacking large integrations with several technologies being deployed by multiple contractors?&nbsp; If so, which areas do you think will benefit the most…….&nbsp; Does it help in areas like coordination, commissioning, and data aggregation or are you seeing other areas?</p>



<p><strong>Ernie: With proper planning and design, the biggest benefits will be commissioning along with troubleshooting.&nbsp; With BacNet, every piece of equipment is daisy-chained and with an IP backbone that isn’t required.</strong></p>



<p><strong>Kody: The utilization of an OT network is absolutely crucial when it comes to being able to program, integrate and commission DDC controllers with</strong>&nbsp;a more efficient, reliable,<strong>&nbsp;and cost-effective approach. We have seen a significant reduction in the amount of time required to get our equipment connected and programmed when utilizing an OT network.</strong></p>



<p>6.&nbsp;<strong>GREG:&nbsp;</strong>One of the major areas of concern with owner IT departments, when MSIs install these networks and connect them to the internet, is cyber security.&nbsp; Have you found that the industry has provided products that address cyber security while giving you VPN access?&nbsp; If so, have these products been easy to deploy?</p>



<p><strong>Ernie: An IT department can set up VLANs strictly for the BMS Equipment and they can not only create firewall rules on the managed switches but also create a secure single point of entry from the internet, thus removing the potential need to have cyber security on each piece of BMS equipment.</strong></p>



<p><strong>Kody: Cyber security is absolutely a valid concern in today’s world. The advantage that</strong>&nbsp;installing an OT network has is that it is largely isolated from the customer’s production IT network infrastructure. Utilizing Optigo Network’s ‘OneClick Secure’ we are able to whitelist authorized MAC addresses and block any unauthorized access to edge switch ports. This allows us, as the MSI to take a security-first approach. We have also been able to have secure VPN remote access through the use of the Tosibox Lock 500. Tosibox’s use of industry-standard<strong>&nbsp;encryption has allowed us to maintain confidence that accessing the remote customer site is safe and secure.</strong></p>



<p>7.&nbsp;&nbsp;<strong>GREG:&nbsp;</strong>Do you see Limbach using IP devices more often when doing negotiated work and design-build projects where you are making the decision regarding the technology being deployed in your customer’s buildings?</p>



<p>Ernie: Limbach will continue to pursue using IP devices when the choice makes<br>the most sense. In new installations, we will recommend it to the customer for<br>speed, efficiency, and down-the-road troubleshooting.<br>Kody: Limbach will certainly continue to recommend the use of OT networks for<br>the underlying BMS infrastructure in every project. We will also continue to<br>recommend the use of IP-based controllers for primary equipment such as AHUs,<br>Plant Controllers, and primary systems.<br>GREG: It sounds like Limbach has embraced the rapid change in our industry and you<br>guys are attacking it head-on! After experiencing the advantages and efficiencies<br>during installation, and hearing Kody use words like “Game Changer”, it appears that<br>you guys will be rapidly moving out of the “MSTP Zone” and moving toward offering<br>the latest building technology and future-proofing your customer’s buildings!<br>John: That’s Definitely the plan!</p>
<p>The post <a href="https://www.smartbuildingdesign.com/new-ip-technology-is-being-deployed-in-bas-projects-today/">NEW IP Technology is being deployed in BAS projects today</a> appeared first on <a href="https://www.smartbuildingdesign.com">Smart Building Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
