The platform offers flexibility to define privileges based on groups or specific users. Permissions can be global or tied to a specified display, object, or input action.
Dynamically create users and store credentials in SQL databases. Get users from Active Directory or third-party system for integrated security or unified login.
Identification policies, session duration, control, automated logoff, e-sign, audit-trail,and a bundle of user management features is available.
Our platform allows delivering applications in compliance with Title 21 CFR Part 11, and it was designed following the applicable recommendations from NERC, such as the CIP- 007-1-Cyber Security-System Management.
Security must be implemented at the core, not applied externally. Our modules have built-in security-related components designed from the core.
Redundancy switch time and high-volume data were tested to meet rigorous offshore requirements. |
The platform automatically initializes and continues to synchronize the primary and secondary servers. The Device communication channels are also easily set up for redundant physical networks and redundant PLC nodes.
Alarm and Historian databases can be assigned to a third-party external cluster or replicated automatically when running on the platform's servers.
Engineering tools provide features to simplify configuration and updates in redundant scenarios.
Redundant or stand-alone servers allow dynamic switching of project versions, without interrupting service for connected clients and keeping the real-time database loaded.
All modules (Real-Time tags, Devices, Alarms, Historians, Scripts, Clients, and others) were designed from the ground up to meet redundancy and hot-swapping requirements.
Learn more at Security, Users and Roles. |