"Plan" and "Do"
Plan and realise the use of our innovative INSYS routers with effective security features like for manipulation protection for example.
Check the e.g. the following using the INSYS routes:
- unauthorised access attempts at the web interface
- each change of configuration
- connecting and disconnecting a device at the Ethernet switch (link up, link down)
- the receipt of IP packets from an unknown device (statefull firewall)
Benefit from the "duress alarm" and act since our routers inform you immediately - a later evaluation of the log file might literally be too late.
Policies & Procedures
Only the interaction of technical, physical and organisational measures as well as their regular check and update provides maximum security; raising the awareness of the employees is only one of many factors of success. This is based on clear guidelines and processes.