SECURITY
Remote operators must guard their network connected facilities against
unauthorized information access, virus intrusion, outside hacker intrusion,
inside hacker mischief, transaction fraud and other system security breaches.
Adequate protection against even the most common kinds of attacks requires
defense-in-depth security technologies, a manageable security policy,
a thorough system audit and a comprehensive maintenance plan.
M2M has the expertise, operational procedures, and breadth of technologies
to protect your Internet SCADA systems while ensuring that it continues
to meet your operational needs. Our unique combination of advanced authentication,
operating system security features, perimeter defenses, rigorous monitoring,
and regular update services will wrap your real-time Internet SCADA system
in layers of security at multiple points of entry.
Further, M2M has created a program of services that includes security
consultation, a review of all network interconnections and a report of
recommendations to keep your system secure. Our strategy combines our
extensive knowledge of real-time systems and administration with the latest
security features and well-established security practices.
For more information on security services and security options for iSCADA
and iDATA, please contact your M2M representative.
|