
Built-in protection with secure I/O and trusted Edge intelligence.


OVERVIEW
The Future of Remote I/O with Built-In Cyber Protection
Protect your data at the Edge
Encryption and Certificates
All groov products use industry-standard HTTPS and TLS encryption—the same secure protocols trusted by online banking. This protects all data in transit from interception or tampering. Additionally, you can install both self-signed and Certificate Authority (CA) security certificates in groov EPIC and groov RIO. These certificates verify the identity of the device and ensure trusted, encrypted communication with browsers, applications, and cloud services.
Authentication
groov systems require users to log in with secure usernames and passwords. Role-based access control lets administrators assign specific privileges, helping to enforce internal policies and limit unauthorised access to critical systems and data.
Separate Network Zones
groov EPIC includes dual independent Ethernet interfaces that allow you to segment your networks. By separating trusted internal networks from untrusted industrial or external networks, you reduce the attack surface and prevent cross-network vulnerabilities.
Secure Linux OS
groov EPIC and RIO operate on a custom-built Linux OS that is cryptographically signed for integrity. This locked-down operating system is tamper-resistant, supports secure boot, and receives regular updates to address cybersecurity threats.
Device-Level Firewalls
Each groov device features a configurable built-in firewall that lets you tightly control which traffic is allowed in or out. Firewall rules can be set based on IP address, port, or protocol—protecting your system at the edge from unauthorised network activity.
VPN-Enabled Communication
groov supports secure VPN access to enable encrypted remote configuration, troubleshooting, and HMI use. MQTT communications are initiated from within the device—outbound only—simplifying firewall setup and limiting external access. All MQTT traffic can be secured with TLS and user authentication, supporting safe and scalable IIoT communications.

Features
Groov Security Features
Secure by default—no security settings buried in menus.
Configure ports and security settings easily through any browser interface.
Set global or user-specific session expiry for added control.
Optional SSH access (with license) for secure custom applications.
Designed to help meet recognised industrial cybersecurity standards.
Track user actions and system events to support audits and alerting.
RESOURCES
groov Security Resources

groov EPIC, groov RIO, MQTT
Guide to Networking groov Products
Discover how to network groov EPIC and RIO — read the full guide now.

groov RIO, groov RIO EMU, groov RIO M1 & M2, groov RIO Security, Opto 22
groov RIO Data Sheet
This data sheet outlines technical specifications, I/O capabilities, supported protocols, and environmental ratings for the Opto 22 groov RIO universal remote I/O modules.

groov RIO, groov RIO EMU, Opto 22
groov RIO EMU Brochure
Get real-time insight into your energy use with groov RIO EMU — no programming, no extra meters. Discover how one compact device delivers 64 channels of accurate, software-defined energy monitoring.

groov EPIC, groov RIO
I/O for the IIoT
See how Edge I/O creates a simpler way to meet the needs of today’s industrial internet of things (IIoT) applications.

groov EPIC, groov EPIC Security, groov RIO, groov RIO EMU, groov RIO Security, Opto 22
Cybersecurity for groov EPIC & RIO
groov EPIC and RIO feature built-in cybersecurity, including secure defaults, VPN, and encryption. This guide shows how to harden your system and protect Edge data.

groov RIO, groov RIO EMU, Opto 22
groov RIO Energy Monitoring Unit Data Sheet
Technical specifications for the groov RIO EMU, including input compatibility, measurement accuracy, supported protocols, and installation requirements for industrial energy monitoring.
FAQ
groov Security Resources
What makes groov EPIC different from traditional PLCs?
groov EPIC combines control, visualisation, data processing, and networking into one edge-ready platform, eliminating the need for separate HMIs, gateways, and PCs.
Can I use groov EPIC with my existing PLC systems?
Yes. groov EPIC supports integration with existing PLCs via protocols like Modbus, OPC UA, and EtherNet/IP, making it ideal for brownfield upgrades.
Is groov EPIC secure for IIoT applications?
Absolutely. It includes a configurable firewall, user authentication, encrypted communications (TLS), and support for secure protocols like MQTT and HTTPS.
What programming options does groov EPIC support?
You can use flow-based programming with Node-RED, IEC 61131-3 with CODESYS, or Opto 22’s native PAC Control—offering flexibility for all skill levels.
Does groov EPIC support cloud connectivity?
Yes. groov EPIC natively supports MQTT Sparkplug B, REST APIs, and secure connections to platforms like AWS, Azure, and Google Cloud.
Can I build and view HMIs directly on groov EPIC?
Yes. With groov View built-in, you can create browser-based HMIs that run locally on the EPIC and are accessible from any device with a browser.
Take The Next Step
Connect With a Team Member
Ready to streamline your operations? Connect with a team member to explore tailored automation solutions that fit your business needs.
Get Engineering Support With Miltek
Need tailored technical advice? Speak with a Miltek engineer to explore solutions built for performance and precision. Miltek is our trusted engineering partner.