by johanna | Jan 18, 2024 | Solution descriptions
A common need in a segmented network environment is to import and export files between different zones. File transfer and file sharing is done both between people and machines, using several different technologies depending on the environment. However, file transfer... by Petra | Aug 29, 2023 | Solution descriptions
Many organisations depend on remote access through RDP, for example, to allow suppliers to perform maintenance, or so that operating personnel can monitor and control a system. Secure remote access solves many of the security risks that are otherwise associated with... by Petra | Aug 29, 2023 | Solution descriptions
Digitalisation means that IT and OT systems are connected. This integration presents security challenges and requires special solutions. Operational Technology (OT) refers to all the subsystems needed to manage and monitor a physical process, for example at a power... by Petra | Aug 29, 2023 | Solution descriptions
Centralised logging in security-sensitive systems involves an enhanced risk of attacks. To reduce the risks, a solution is needed that protects both log data and all connected systems. Most IT systems generate logs that enable troubleshooting and traceability. To... by Petra | Aug 29, 2023 | Solution descriptions
To transmit critical information, e.g. from a SCADA system to an administrative office network means potential security risks. But there are solutions that take care of security problems and at the same time enables an exchange of information. SCADA... by Petra | Aug 29, 2023 | Solution descriptions
Updates for Windows and Linux systems are an important part of maintaining the security of the digital information in these systems. However, the updates themselves may be a security risk – to avoid these risks and to maintain the integrity and availability of...