Red Lion’s FlexEdge Intelligent Edge Automation Platform now combines the scalability of Linux with the power of Crimson 3.2 software into one user-friendly operating system. This fusion enables a single FlexEdge controller to provide advanced networking, security, and automation. By integrating information technology and operational technology, FlexEdge helps customers reduce costs, improve data security, and increase productivity.

Powered by Crimson 3.2 software, the FlexEdge platform provides customers with maximum flexibility to easily modify controller functionality as application needs change. From advanced networking to automation, one controller does it all. Customers can enable additional functionality through field-unlockable software upgrades that eliminate the need to purchase or add more equipment, saving both money and unnecessary downtime.

Critical communications applications

These new capabilities open doors to new product combinations, further expanding the applications to which the FlexEdge platform can be deployed. With FlexEdge’s modular communications sleds, users can now deploy multi-cellular radio gateways for critical communications applications. And, for environments with demanding requirements, the platform offers multiple isolated serial ports, routable Ethernet ports, optional serial, USB, Wi-Fi, and cellular communications sleds, and field-installable I/O.

Find out the state of adoption, trends and opportunities with Artificial Intelligence (AI) in physical security.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...