exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

Book: Functional Safety for Managers

Functional Safety for Managers, What Managers Need to Know is a practical guide that clearly presents and explains the importance of Functional Safety Management, as well as having well defined Key Performance Indicators to track and manage performance. In particular, by: Developing Functional Safety Management (FSM) processes and procedures that…


Book: Implementing IEC 62443 - A Pragmatic Approach to Cybersecurity

All New 2nd Edition! How is the cybersecurity landscape for automation systems changing? How does the IEC 62443 cybersecurity standard apply to today’s automation systems? How can I improve cybersecurity for my organization without making my system inoperable? You can find the answers to these questions and more in Implementing…


Book: Final Elements in Safety Instrumented Systems

How are final control elements used in Safety Instrumented Systems? How do the IEC 61508 and IEC 61511 functional safety standards apply to these final control elements? The answers to these questions are in this book “Final Elements in Safety Instrumented Systems, IEC 61511 Compliant Systems and IEC 61508 Compliant…


Book: Safety Instrumented System Design: Techniques and Design Verification

This book provides an excellent description of the design phase of the SIS safety life cycle as defined in IEC 61511:2016. It focuses on the fundamental concepts, starting with a description of the entire safety life cycle process and then explaining how the design steps—from conceptual design through design verification—fit…


Yokogawa Electric Corporation - ICSS CENTUM and ProSafe-RS

IEC 62443, ISASecure in the Security Automation Equipment List


Blog Entry: Why PLCs Are Not Hardware Security Boxes Under the EU CRA

Introduction Under the EU Cyber Resilience Act (CRA), product classification drives the compliance path—including the depth of required evidence and whether conformity can be supplier-led or requires third-party involvement. This post explains why programmable logic controllers (PLCs) used in operational technology (OT) environments are generally not “Hardware Security Boxes” (HWSBs):…


Recorded Webinars: When “worst-case” isn’t good enough: Why Your LOPA Might be Underestimating Risk

Overview: In process safety, many engineers default to the "worst-case" event as their sole design basis for a SIF during Layer of Protection Analysis (LOPA). While this feels conservative, analyzing initiating events in isolation often ignores significant residual risk. If your LOPA doesn't account for the summation of all initiating events, you are likely underestimating your demand frequency—and potentially your required Safety Integrity Level (SIL).

In this webinar, Alejandro Esparza dives into how to handle multiple initiating events in LOPA. We will demonstrate how a "worst-case" analysis can miss up to 20% of the actual risk profile, leading to under-designed safety systems and inadequate testing intervals.

Key Takeaways:

  • The Summation Secret: Why analyzing initiating events in isolation leads to inadequate SIL targets.
  • Demand Mode Drift: How cumulative risk can push a SIF from "Low Demand" to "High Demand," fundamentally changing your maintenance requirements.
  • Real-World Impact: A fired heater case study showcasing the 20% risk gap.
  • Tooling for Accuracy: How to leverage safety lifecycle tools like exSILentia® to automate summation and ensure no risk is left uncounted.

Who Will Benefit? Process Safety Engineers, Control Systems Engineers, SIS Specialists, and Operations Managers responsible for IEC 61511 compliance and risk reduction.


Recorded Webinars: Quick FMEDA: Calculate Total Failure Rate & Useful Life in Minutes

Sometimes, the goal isn't a complex safety certification; it's a fast, accurate snapshot of product reliability. This video demonstrates a streamlined workflow within OEMx designed for engineers who need high-level reliability data fast.

Instead of painstakingly categorizing every failure mode into (safe vs dangerous, detected vs undetected), we show you how to simply include or exclude failures to reach your Total Failure Rate. You get the benefit of the world’s most comprehensive component database and automated failure data loading, allowing you to finish your analysis in a fraction of the time.

Key Takeaway: "Quick and Easy" doesn't mean "Inaccurate." By using the right tools (FMEDAx and exida Component Reliability Database), you can simplify the process without compromising the data.

Duration: 10:02


Recorded Webinars: Are Your SIS Performance Assumptions Realistic? Let’s Find Out!

Safety Instrumented Function (SIF) design is based on performance requirements. During design, assumptions concerning SIF equipment failure rates, SIF demand rates, proof test frequencies, mission time are made. These form the basis for the expected performance.

Are those assumptions realistic? Is the SIF really operating as assumed?

IEC 61511 expects users to periodically compare actual performance with assumed performance. How do we do that? What is needed to get statistically viable results from the collected data? How does the data apply? How do we make sure we avoid drawing unrealistic conclusions?

This presentation will look at answers to these questions.

Presented at the Hazards35 Process Safety Conference in Birmingham, UK (Nov 2025).


Recorded Webinars: Transform Your Operations & Maintenance with SILstat™

This video provides a comprehensive overview of exida’s SILstat software. SIL stat helps with the operation and maintenance phase of the functional safety lifecycle. It can be used to track the performance of your safety system and to validate assumptions made during the analysis and design phase of your safety instrumented system.


Horizon Journey (Shanghai) Technology Co. Ltd., - Horizon Journey 6 Toolchain – Development Tools (OE3.7)

ISO 26262 in the Safety Automation Equipment List


Horizon Journey (Shanghai) Technology Co. Ltd. - Horizon Journey 6 Toolchain – Runtime Library (OE3.7)

ISO 26262 in the Safety Automation Equipment List


Blog Entry: From HLRA to DLRA: Simplifying OT Cyber Risk Assessment with exSILentia® Cyber

As the cybersecurity landscape continually evolves, engineers here at exida are working with organizations looking to achieve and maintain cybersecurity compliance. Tools like exSILentia® Cyber help end users comply with the standards and improve the traceability and documentation of cybersecurity tasks throughout their company. exSILentia Cyber is a great tool…


News Item: exida Announces New Whitepaper on the Qualification and Certification of Open-Source Software (OSS)

SELLERSVILLE, PA – March 25, 2026 – exida, the global leader in functional safety and cybersecurity certification, is pleased to announce the release of its latest technical whitepaper: “Qualification and Certification of Open-Source Software.” This landmark document addresses the growing necessity of integrating Open-Source Software (OSS) into safety-critical industrial and…


White Paper: Qualification and Certification of Open Source Software

As Open-Source Software (OSS) becomes essential for high-complexity, safety-critical applications, the industry must bridge the gap between transparent OSS development and traditional, rigid “V-model” safety standards. This whitepaper provides a roadmap for users, maintainers, and integrators to successfully qualify OSS Linux and GNU/Linux projects up to SIL 2 / ASIL…


Recorded Webinars: From HLRA to DLRA: Simplifying OT Cyber Risk Assessment with exSILentia Cyber

Considering a Cyber Risk Assessment and don’t know where to start - well we have news for you!

We gathered feedback from both our customers and our own Engineering teams on usability improvements and features, and our software team has delivered!

Allow us to introduce our new revision of exSILentia Cyber with new dedicated HLRA (High Level Risk Assessment) and DLRA (Detailed Level Risk Assessment) worksheets. This new structure follows the IEC 62443-3-2 OT Cyber Risk methodology where an initial Cyber Risk Assessment (HLRA) can first be carried out, followed by a DLRA. Data gathered during the HLRA can be easily brought into the DLRA using smart linking functionality.

We have added many features including:

HLRA:

  • Zone Specific Navigation Tree Layout
  • Dedicated columns for Devices, threats, and Consequences as well as Non-Hackable Protections
  • See your Risk score throughout the process against your risk categories (e.g. Business impact, Safety, environmental - all completely configurable)
  • Dedicated column for device-based recommendations

DLRA:

  • New DLRA Threat column allowing entry of bespoke device threats
  • Link the original HLRA Cyber Consequence into your DLRA Consequence worksheet with ease, using our linking functionality
  • Create and build a library of custom countermeasures which can be reused through the DLRA process where applicable
  • Build custom countermeasure and categories that align with IEC 62443-3-3 foundational requirements  

For both HLRA and DLRA, you can now set a default likelihood during risk setup, which allows each new iteration to be set with an initial likelihood. This can of course be changed after as required.

Join Dwane Shelton as he walks us through a live example of both a High and Detailed level Risk Assessment using our new release of exSILentia Cyber


Total Soft Bank LTD - Development, Implementation and Maintenance of Maritime and Port Logistics Information Systems ​

IEC 62443-4-1 in the Security Automation Equipment List


Blog Entry: When “Worst-Case” Isn’t Good Enough: Why Your LOPA Might Be Underestimating Risk

When designing a Safety Instrumented Function (SIF), practitioners often encounter a complex scenario: multiple initiating events (independent causes) leading to the same hazardous consequence. While common industry practice is to design for the “worst-case” scenario in isolation, this approach contains a hidden danger. A groundbreaking whitepaper from exida reveals why…


Recorded Webinars: What is the Swiss Cheese Model And How Does It Apply to SIS?

The “Swiss Cheese” model is a visual way of demonstrating what happens to a Safety Instrumented System (SIS) and other Independent Protection Layers (IPLs) when not following the IEC61511 lifecycle and/or RAGAGEP (Recognized And Generally Accepted Good Engineering Practices) for the maintenance and mechanical integrity requirements.  The “holes” in the Cheese represent a degradation of the SIS and iPLs created by random or systematic faults.  These failures result in the “holes” appearing in our model and when all the “holes” line up, this is when the SIS and other protection layers fail to perform their risk reduction task resulting in an incident.  This can then lead to severe consequences in terms of explosions, fires, toxic releases, etc.

The webinar ties in the Swiss Cheese model approach to the proper operation and maintenance requirements for the SIS and IPLs, which includes site culture, practices and competency.

What you will learn

  • What is the Swiss Cheese model
  • What role culture plays in avoiding problems
  • What are random and systematic faults and the effects
  • What happens when IPLs fail
  • What it means to the end user

Who should attend

  • SIS designers and Engineering contractors
  • Operations and maintenance personnel
  • Plant Managers and Supervisors


Peak Carbon Capital - Butterfly Valve Isolation and Purge Dampers

, IEC 61508 in the Safety Automation Equipment List


Page 1 of 146 pages.  1 2 3 >  Last ›