Loading
A
Utility Header Logo
Company
Plex Community
Change Country Site SelectionChange RockwellAutomation.com site selection to a different country, region or language
US | EN
Plex, a Rockwell Automation Company logo
Products
Manufacturing Execution System (MES)
Manufacturing Execution Suite (MES) is a comprehensive manufacturing software solution that provides real-time, paperless production management to drive enterprise-wide compliance, quality, and efficiency.
Quality Management System (QMS)
Quality Management System (QMS) is a cloud-based digital quality solution for manufacturers that standardizes and automates quality documentation, processes, and measurements.
Enterprise Resource Planning (ERP)
Enterprise Resource Planning (ERP) is a full-featured, scalable, cloudbased ERP that automates front- and back-office processes.
Supply Chain Planning (SCP)
Supply Chain Planning (SCP) combines data from your Plex ERP and multiple departments across your business to sync up demand and supply planning to improve inventory accuracy and production management.
Connected Worker
Connected Worker empowers frontline manufacturing teams with real-time digital tools to improve productivity, reduce errors, and enhance collaboration. It connects your people, to purpose, people, productivity, and processes to drive continuous improvement and workforce agility on the shop floor.
Production Monitoring
Production Monitoring provides seamless connectivity to machines on the plant floor, delivering transparent, real-time operational KPIs and dashboards to drive continuous improvements.
MES Automation & Orchestration
MES Automation & Orchestration connects your Plex MES to the plant edge to control information flow, processes, and workcenter setup adding efficiency, saving costs, and eliminating manual errors.
Asset Performance Management (APM)
Asset Performance Management (APM) combines process, operational, and machine-level data through highly visual dashboards to proactively monitor machine and plant health to ensure optimal uptime, throughput, and maintenance needs.
Finite Scheduler
Finite Scheduler is an advanced production scheduling tool that helps manufacturers optimize resources, reduce bottlenecks, and improve on-time delivery. It enables dynamic, constraint-based scheduling to align operations with real-world capacity and demand
Platform
Smart Manufacturing Platform Overview
Discover how our integrated platform connects, automates, tracks, and analyzes your operations.
Cloud Infrastructure & Security
Enterprise-grade cloud infrastructure with industry-leading security and compliance.
Mobile Application
Access critical manufacturing data and controls from anywhere with our mobile apps.
Availability & Performance
Industry-leading uptime and performance with 99.5% availability guarantee.
Manufacturing Automation
Seamless integration with Rockwell Automation and other manufacturing systems.
Industries
Aerospace Auto and Tire Food & Beverage Industrial Manufacturing Plastics & Rubber Precision Metalforming
Plex Generic Dark Background
INTERACTIVE DEMO
Plex MES for Automotive

Gain Real-Time Visibility and Control of Your Operations

Try Now
Resources
All Resources Success Stories Analyst Reports Knowledge Articles Demos Blog
Plex Generic Dark Background
Analyst Report
2025 Gartner® Market Guide for Manufacturing Execution Systems
Read More
TALK TO US
SEE A DEMO
A
Utility Header Logo
Company
Log In Plex Manufacturing Cloud Plex Classic
TALK TO US
SEE A DEMO

Trust Center

Cybersecurity is a top priority here at Plex. As a cloud-based software service, we treat our responsibility for your data with the utmost seriousness. That’s why we maintain compliance with the most stringent information technology standards. Below you’ll find a detailed breakdown of everything we do to keep your data safe and secure.

Our efforts extend not only to the privacy and security of your data, but also its integrity and availability.

Data Encryption

Data
Confidentiality

Only authorized parties have access to your data.

Cloud Network

Data
Integrity

Controls are in place to ensure that your data is protected from errors and corruption.

Shield Lock

Data
Availability

Network security and availability are built into our platform so you can access your data anytime, anywhere.

Security Policy

Data
Privacy

Private data is identified and protected according to applicable laws, rules and regulations.

We don’t take your trust for granted. It’s the foundation of our partnership together, and it’s why we continue to seek out new cybersecurity standards and certifications to meet.

Check back regularly on this page to learn about the updates we’re making in our mission to serve you better.

Questions? We’re here for you. Reach out to us anytime.

ISO 27001 Badge
Chevron DownChevron Down

Plex is ISO 27001:2013 certified. All Annex controls were applicable and were addressed.

ISO 27017 Badge
Chevron DownChevron Down

Not available.

SOC 2 Report
Chevron DownChevron Down

Available.

SOC 1 Report
Chevron DownChevron Down

Available.

CAIQ L1
Chevron DownChevron Down

Available at https://cloudsecurityalliance.org/star/registry/rockwell-automation.

High Level Architecture Description
Chevron DownChevron Down

Available.

High-level Secure Arch Diagram
Chevron DownChevron Down
Plex Manufacturing Cloud
Business Continuity and Service Resilience
Chevron DownChevron Down

Plex is hosted on only tier 5 data centers with robust protection and a high ability to retain data processing capabilities in many disruption scenarios. The data in these Datacenters are in turn backed up to other tier 5 datacenters at a substantial geographic distance from the primary site. Data uploaded and processed on Plex is replicated in real time to both the primary and secondary sites simultaneously such that the role of primary datacenter can be switched rapidly. In demonstration of its high resilience, Plex switches datacenters on a monthly cadence to verify the effectiveness of its disaster recovery capabilities. Within each datacenter, critical components are implemented in a high-availability architecture with built-in redundance. This explains the impressive SLA statistics that Plex has shown over the years. Plex also hosts data on Microsoft's Azure cloud. These instances also follow the BCP practices described above for a seamless customer experience.

Secure SDLC
Chevron DownChevron Down

Plex's software development philosophy is based on the Rockwell Automation Product Lifecycle (RAPL) that emphasizes and prioritizes a product's security and safety. It follows a Design for Security (DfS) approach that requires rigorous vetting of components, methods, and technique. Development operations includes a Dynamic and static scan and independent verification of and tests. Only secure builds are permitted into the production environment. Prior to the initiation of new applications and major upgrades, the security and privacy concerns and implications are documented and a risk analysis is conducted. Throughout the design and development phase, automated checks are imposed and a manual review and penetration test is conducted at the end of the build before the code or feature is released.

Network Security
Chevron DownChevron Down

Network security is a critical requirement for the Plex Smart Manufacturing Platform and due care is taken to develop and maintain a secure network for customers and employees. Measures deployed include network segmentation with appropriate zoning, a zero-trust approach to resource access, network monitoring, rapid response, and ingress/egress traffic examination. Network security has been designed into the network and this helps to support the correct functioning of security controls. From the edge to the internal core, traffic is policed and monitored.

Shared Cloud Security Responsibility Model
Chevron DownChevron Down

Plex operates a shared security responsibility model that requires the participation of the platform and the customer in managing the security of the tenant and the data hosted there. Plex secures the cloud platform and the underlying subsystems. It also provides customers the capabilities to set and enforce their own security policies with features such as Tenant Access Management (TAM), single sign-on, and event management and monitoring amongst several other controls.

Virtualization Security
Chevron DownChevron Down

As a multitenant platform, Plex acknowledges that virtualization security and reliable tenant isolation is critical to the service provided. To this end, the platform is built on industry trusted and tested virtualization technology and has chosen an architecture that supports multitenancy and prevents the cross-contamination of data. These controls are tested regularly to ensure that they remain effective. The efficacy of this control is the subject of continuous improvement, audits, and product development to provide confidence in the security of customer data.

Application Security
Chevron DownChevron Down

All aspects of code development and access is securely managed. Through an automated and manual process of unit and integration testing, the security of each piece of code and feature set is established. Code repositories follow the access control policy and changes to the repositories are policed to validate that the change is valid, authorized and safe. Application security testing includes all the OWASP top 10 security concerns.

Significant Vendors
Chevron DownChevron Down

The Plex Smart Manufacturing Platform depends on sub-vendors to deliver its services. Plex ensures the contractual agreement with these vendors is more than sufficient to deliver the availability and security SLA expected by customers. Below are the critical vendors used for the delivery of service.

  1. Azure - Cloud Hosting
  2. Iron Mountain - Colocation hosting
  3. Switch - Colocation hosting
  4. QTS - Colocation hosting
  5. Microsoft - Enterprise services
Privacy Notice
Chevron DownChevron Down

Please click here to review the Rockwell Automation privacy notice.

Data Protection TOMs
Chevron DownChevron Down

TOMs addendum to the DPA.

Security Scanning Statement
Chevron DownChevron Down

Security scanning is conducted on the Plex application as well as the infrastructure that supports and delivers the application. The scans include the following: 

  1. attack surface scanning
  2. network scanning
  3. cloud security posture scanning
  4. application dynamic and static scanning
  5. Public security reputation scanning

These scans provide us with a vast amount of intelligence about the security of our systems and we initiate remediatory actions to address risky conditions as needed.

Network Security Statement
Chevron DownChevron Down

Plex is hosted in a network environment that features a defensible architecture that includes the use of multizoned firewalls, intrusion detection and prevention systems, and network security groups. Traffic flows and ports are policed to permit only expected and authorized traffic.

Access Control Statement
Chevron DownChevron Down

Plex has implemented an access control policy that is resilient that includes controls such as least privileged access, multi-factor authentication, and privileged access controls. The application also gives customers the capability to deploy additional controls according to their own internal policies so that the customer can enhance their own access to the application. Internally, access to the Plex Smart Manufacturing Platform is tightly restricted and requires multiple layers of authentication and multifactor authentication.

Identity Management
Chevron DownChevron Down

Plex is designed to provide enterprise-level identity management capabilities. This can optionally be a shared security control where we provide you with the tools to manage identities based on your own internal security policy or you're welcome to use the identity management suites that your company is already familiar with.

Vendor and Supply Chain Security
Chevron DownChevron Down

Plex appreciates the criticality of supply chain security and third-party security. For this reason, we maintain an inventory of all components that go into the application. This is maintained in a detailed Software Bill Of Material (SBOM) which is reviewed continuously for risk or compromised contents. Furthermore, Plex tracks all suppliers and third-party providers by requesting and reviewing their SOC 2 reports and conducts a due diligence risk review prior to engaging the vendor and on an ongoing basis. Only secure and authorized vendors are used as sub-processors. Contract language includes information security requirements and minimum security requirements to which vendors and suppliers must adhere.

Internal Control and Audit
Chevron DownChevron Down

The internal control system within Plex is designed to track all security requirements from Rockwell Automation, security framework standards, customer security requirements, and other best practices. The internal audit team uses a variety of automated and manual tools and processes to determine conformity. For cases of missed conformity, a corrective action plan is documented and initiated to improve the compliance posture. The management team is also made aware of significant audit findings. These findings are deliberated and additional controls are applied where necessary.

Incident Response and Notification
Chevron DownChevron Down

Plex has implemented a robust incident management process. Incident conditions are detected through many channels, including customer complaints, employee reports, security event logs and correlations, threat intelligence, system anomalies, etc. We also publish contact channels by which employees, users, and customers can escalate incidents. Internal sources and external sources are polled continuously and the signals are triaged to isolate the most significant signals. A tier 1 team responds to incidents and can escalate to a tier 3 level if necessary. Incidents are contained immediately and notifications are sent through secured channels to the right entities. A post-incident analysis is used to improve the process on an ongoing basis. Table-top exercises are conducted periodically to test and improve the overall incident management process.

Change Control and Quality Management
Chevron DownChevron Down

Plex is committed to the secure management of change. For this reason, we have implemented a change management policy and process compliant with ISO 27001. In this process, all configuration item are tracked and all system states are recorded. According to the policy, all changes must be documented and approved before being executed. A testing plan and roll-back plan is also documented. Once approved, the change is carried and the new system state is reviewed again. Significant changes have to go through a risk assessment before being carried out. The change management process is connected to the business continuity process and risk management process.

Cryptography
Chevron DownChevron Down

Data in transit is protected using TLS (Transport Layer Security) 1.3 or higher to ensure data confidentiality. TLS provides strong authentication, message privacy, and integrity. Data at rest is protected using AES-256 CSP default encryption and Cloud Service Provider managed keys.

Data Security and Protection
Chevron DownChevron Down

Plex approaches data security by determining the class of data and the rules, standards, and laws by which they should be governed. Customer data is accorded the highest security classification. This requires an increased level of restriction throughout the lifecyle of the data. Data is securely transferred into the platform and is not shared without the customer's authorization and information. All security controls, including encryption, crypto-erasure, disposal, secure transportation, and distribution are applied. Detective controls are also deployed to detect potential misuse and abuse of data. Customers can apply additional data governance rules and policies within their own tenant, according to their own business objectives.

Governance, Risk and Compliance
Chevron DownChevron Down

Plex is supported by an effective governance, risk management, and compliance program administered by the global CISO team of Rockwell Automation. The GRC team manages and maintains the information security management system (ISMS) and manages the controls that are used to support the ISO 27001 and SOC 2 program. The GRC processes help orchestrate all the activities and practices required to maintain and improve the information security management system.

Vulnerability Management
Chevron DownChevron Down

Vulnerability management is an important practice in the Plex Smart Manufacturing Platform. The vulnerability management program covers the entire software development lifecycle, the cloud infrastructure, endpoints, containers, production code, etc. The vulnerability managers connect to multiple vulnerability databases and use automated solutions to scan the enterprise to find vulnerable system components. Prioritized remediation is used to address the high-risk items quickly. A "Fix Directive" is in force at an enterprise level and this requires a continuous vulnerability tracking and remediation process. A risk assessment is done to determine how, what, and when resources will be directed and which issues will be prioritized. Factors that inform vulnerability prioritization include vulnerability criticality, asset criticality, threat intelligence, customer experience, and business continuity.

Logging and Event Monitoring
Chevron DownChevron Down

Plex understands the importance of logging events and monitoring the platform. As part of its ISO 27001 ISMS, it has deployed a SIEM solution that tracks and correlates important system events. It also tracks events on each customer's tenant in order to give customers ample information about the security and operational posture of their tenant and workloads. The logs are protected from alteration and are stored for at least 90 days.

Privacy and GDPR Statement
Chevron DownChevron Down

Plex is committed to protecting the privacy of personal information. Plex requires and stores only the minimum level of PII required to uniquely identify and provide services to customers' employees. Some of these include first name, last name, work email address, and sometimes work address. We do not store and retain extensive levels of PII that are not required to deliver the contracted service. For more information about our privacy practices, please visit our Privacy & Cookies Policy.

Data Retention
Chevron DownChevron Down

Rockwell's data retention policy requires that the data of exiting customers be securely deleted after it exceeds a specific period of dormancy. Although Plex protects a customer's data throughout its lifecycle, at the end of the relationship, the customer can request for their data to be destroyed immediately or have it ported off in an agreed format. Regardless of the customer's instruction, the data will be purged after a short wait period. Based on the shared security responsibility model, customers are encouraged to implement their own data governance and management system using the capabilities provided within the Plex Smart Manufacturing Platform tenant.

  1. Chevron LeftChevron Left Homepage Chevron RightChevron Right
  2. Chevron LeftChevron Left Plex Trust Center Chevron RightChevron Right
Products
Manufacturing Execution System (MES) Quality Management System (QMS) Enterprise Resource Planning (ERP) Supply Chain Planning (SCP) Connected Worker Production Monitoring MES Automation & Orchestration Asset Performance Management (APM) Finite Scheduler
Platform
Smart Manufacturing Platform Cloud Infrastructure & Security Mobile Application Availability & Performance Manufacturing Automation
Resources
All Resources Case Studies Analyst Reports Knowledge Articles Demos Blog
Industries
All Industries Aerospace Auto and Tire Food & Beverage/CPG Industrial Manufacturing Plastics & Rubber Precision Metalforming & Fabrication
Services & Support
Customer Success & Advocacy Support Services Educational Services Professional Services Plex Community
Company
About Us Why Plex Recognition Newsroom Careers Contact Us
Get Started
Request a Demo Download Resources Read Success Stories Webinars Contact Support
Privacy & Cookie Policy
Terms & Conditions
Cookie Preferences
Accessibility Settings
Trust Center
© YYYY Plex, by Rockwell Automation. All rights reserved.
© YYYY Rockwell Automation, Inc.