U

Secure remote access

Secure remote access

Many organisations depend on remote access through RDP, for example, to allow suppliers to perform maintenance, or so that operating personnel can monitor and control a system. Secure remote access solves many of the security risks that are otherwise associated with...
IT/OT integration

IT/OT integration

Digitalisation means that IT and OT systems are connected. This integration presents security challenges and requires special solutions. Operational Technology (OT) refers to all the subsystems needed to manage and monitor a physical process, for example at a power...
Traceability and security logging

Traceability and security logging

Centralised logging in security-sensitive systems involves an enhanced risk of attacks. To reduce the risks, a solution is needed that protects both log data and all connected systems. Most IT systems generate logs that enable troubleshooting and traceability. To...
Secure transfer of SCADA information

Secure transfer of SCADA information

To transmit critical information, e.g. from a SCADA system to an administrative office network means potential security risks. But there are solutions that take care of security problems and at the same time enables an exchange of information.     SCADA...
Secure Updates

Secure Updates

Updates for Windows and Linux systems are an important part of maintaining the security of the digital information in these systems. However, the updates themselves may be a security risk – to avoid these risks and to maintain the integrity and availability of...