As IT and industrial systems around the world face increasing threats of security breaches, cybersecurity is a priority we share with all our clients.
In response to this, we work tirelessly to ensure maximum security while reducing the risk of breaches across the value chain thanks to dedicated, built-in ‘by design’ features, breach-mitigating architecture, and frequent security audits.
A range of options are available to manufacturing companies looking to connect their machinery and equipment. From Ewon industrial IoT gateways to industrial PCs, each type of connectivity architecture is backed by its own specific security structured around two core pillars that drastically reduce the risk of breaches:
Users are key targets for security breaches. We’ve put in place a range of features that allow us to tightly configure access security levels:
Option of adding a captcha
Option of delegating authentication to a third-party service such as ADFS or SAML
Configurability of password complexity: Minimum length, special character inclusion
Configurability of password expiration
Configurability of session times
A user permissions system by role allows user access to be limited to pre-set data and features.
Finally, all user activity carried out in the app is traced and logged for an unlimited time, allowing any malicious acts to be analysed further down the line.
The data we process is stored on the Cloud in infrastructure that ensures the very highest level of security. We work with OVH and Microsoft Azure, partners whose server security has been certified:
In addition to this, a firewall monitors all incoming and outgoing connections with razor-sharp precision.
The InUse platform is accessible using any browser and is available via the encrypted access HTTPS protocol. The authorised cipher suites are restricted to those recommended by the ANSSI, the French National Agency for the Security of Information Systems.
Our platform also complies with OWASP guidelines setting out the rules and methods to be used in securing web apps.
What’s more, our platform is regularly subjected to breach tests conducted by ANSSI-certified third parties in order to identify and correct any potential weak spots.