ProSoft Insights / Technology focus

How Can You Be Sure Your Remote Connectivity Solution is Secure?

Language

Search Insights

Categories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Packaging OEM saves time via remote monitoring

18 Янв, 2019 / Application stories

Hassia-Redatron GmbH, a machine builder in Germany, was in a spot that many OEMs find t...

How to connect an ICX35 to a Modicon M340 PLC over Modbus TCP/IP

16 Янв, 2019 / Videos

In this follow-up training video about ProSoft Technology’s ICX35-HWC Industrial Cellul...

Need to connect your Allen-Bradley Remote I/O PLC to EtherNet/IP FLEX adapters?

10 Янв, 2019 / Videos

This video walks you through the process to set up ProSoft Technology’s AN-X2-AB-DHRIO ...

Happy New Year from ProSoft Technology!

07 Янв, 2019 / News & Events

ProSoft Technology’s teams would like to wish you all the best for this New Year! Let’s...

How Can You Be Sure Your Remote Connectivity Solution is Secure?

You’ve likely heard of some of the benefits of a reliable remote connectivity solution by now: from decreased travel time and costs to predictive maintenance, the benefits are there in a well-designed solution.

But maintaining secure connections and access methods is paramount. It can be daunting to determine the security needed for your operation, but here are a few aspects you should be aware of when planning your remote connectivity strategy:

  • If you’re considering a platform that utilizes the remote user’s PC, it’s best to opt for one that does not require software patches. This has been a top avenue for hackers. Instead, look for a program that’s updated for you, with no user-installed software. This will also save your workers time since they will not have to handle software updates.
  • You may need to grant access to your plant equipment to an outside vendor – but you don’t need to give them access to every network in your facility. Consider a solution that lets you bypass a guest VPN option – one option is a gateway that will let the outside worker access just the portion of your operation they need to see.
  • Two-factor authentication is used by many services to ensure security, but not all methods are at the same security level. Some companies opt for SMS-based authentication, which NIST has cautioned against. A token-based approach is a more robust verification method.

 

For more information about security considerations for each zone of your facility – Machine, Enterprise, and Outside – download this white paper.