System Engineering Tools.

Save time and money, while increasing efficiency and productivity.

Products


Our portfolio includes software tools for process hazard analysis (PHA), alarm rationalization, and Safety Instrumented System (SIS) Design. Our flagship product (exSILentia®) is the world’s best-selling tool for SIL Verification.

Tool Training Courses

We offer a range of tool training courses for professionals in the process industry, from basic to advanced concepts. We also offer customized training options available upon request.

Students benefit from exida's in-depth knowledge and expertise , enabling them to fully understand how to use their powerful engineering tools effectively and efficiently.

ALM 111-E - Applying ISA-18.2 Alarm Management Best Practices to Your DeltaV System

This course will show how to implement alarm management best practices in your DeltaV system through the use of tools such as Alarm Help, DeltaV Analyze, DeltaV Mosaic, Alarm Shelving, Conditional alarming, System Alarm Management, XL Reporter, and SILAlarm. It will also discuss how to make your DeltaV system comply with the ISA-18.2-2016 standard “Management of Alarm Systems for the Process Industries” by following the alarm management lifecycle. Attendees will gain an appreciation for the alarm management capabilities available in DeltaV so that they can determine how to best apply them to their operations. The course prepares participants to support an alarm management program for a DeltaV system including tasks such as creating an alarm philosophy document, performing alarm rationalization, analyzing alarm system performance, alarm system maintenance, and resolution of alarm management issues.

More Info    

ALM 111-R - Applying ISA-18.2 Alarm Management Best Practices to Your Rockwell PlantPAx System

This course will show how to implement alarm management best practices in your Rockwell control system through the use of tools such as Factory Talk Vantage Point, Alarms Builder, Alarm Shelving, conditional alarming, XL Reporter, and SILAlarm. It will also discuss how to make your PlantPAx system comply with the ISA-18.2-2016 standard “Management of Alarm Systems for the Process Industries” by following the alarm management lifecycle. Attendees will gain an appreciation for the alarm management capabilities available in their control system so that they can determine how to best apply to their operations. The course prepares participants to support an alarm management program including tasks such as creating an alarm philosophy document, performing alarm rationalization, analyzing alarm system performance, alarm system maintenance, and resolution of alarm management issues.

More Info    

ALM 241 - Alarm Rationalization with SILAlarm

Attendees will learn how to conduct alarm rationalization of greenfield (new) or brownfield (existing) applications in order to optimize performance of their alarm systems. The class immerses participants in discussion and hands on exercises which have been designed to demonstrate the best practices and requirements for rationalization as taken from the ISA-18.2 alarm management standard and EEMUA 191 guideline. The class focuses on how rationalization can lead to improved operator performance by eliminating / preventing common alarm problems such as nuisance / chattering / stale alarms, incorrect priority, alarm overload, and alarm floods. It also includes a discussion on tips and tricks for creating an alarm philosophy document, such as how to effectively define the “rules” for rationalization. Exercises will use exida’s SILAlarm rationalization tool.

More Info    

FSE 243 - Layer of Protection Analysis with exSILentia®

Layer of Protection Analysis with LOPAx™ and Safety Requirements Specification with SRS, FSE 243, explains how the exSILentia LOPAx™ module is used to conduct a Layer of Protection Analysis. This course is targeted towards students that have a general understanding of layer of protection analysis and safety requirements specifications who want to learn how to leverage the advanced features of LOPAx™. It will cover how to analyze hazard scenarios considering the frequency of initiating events and the probability of failure for each independent protection layer (IPL) as well as enabling conditions and conditional modifiers. This course will show how to calculate the required Risk Reduction Factor of an IPL and identify Safety Instrumented Functions (SIF). It will teach users how to transfer data from PHAx™ to LOPAx™.

More Info    

FSE 244 - SIL verification with SILver™

SIL verification with SILver™, FSE 244, explains how the exSILentia SILver™ module is used to perform a SIL verification for Safety Instrumented Functions. Students will learn to leverage the tool to model different SIF architectures ranging from simple 1oo1 configuration to more complex examples. This course also covers review of the key parameters that determine the probability of failure of a SIF as well as minimum hardware fault tolerance and systematic capability aspects. It will show the impact of these parameters on the detailed design, implementation, and operation of the SIF. Furthermore, students will learn how to transfer data from the SILver™ module to the Design SRS module and subsequently complete the Design SRS requirements. Finally, the course covers the impact of proof testing and specification of proof test procedures using the Proof Test Generator module.

More Info    

Title Cybersecurity Risk Assessment and Security Level Verification using exSILentia Cyber

Cybersecurity Risk Assessment and Security Level Verification using exSILentia Cyber, CS 241, explains how the exSILentia Cyber modules CyberPHAx and CyberSL are used to perform high-level risk assessments, detailed risk assessments, and security level verification for industrial automation and control systems. Students will learn to leverage the tool to evaluate cybersecurity risk in different types of network zones ranging from business enterprise zones to basic process control zones and safety instrumented system zones. This course provides the methodology to systematically review zones of to the degree required by their associated cybersecurity risk. This course also covers the review of key parameters for determining cybersecurity risk and evaluating the effectiveness of countermeasures and other means of improving security. It will show the impact of these parameters on the overall likelihood of a successful attack for a zone under review. Furthermore, students will learn how to transfer data from the CyberPHAx module to the CyberSL module and subsequently verify the achieved security level using a semi-quantitative approach.

More Info