A secure system requires:
Physical security: Your JACE network should be located in a guarded location with appropriate locks, security systems, and physical access control.
Protection against hacking: Your computers need firewalls, passwords and other software access controls.
Verification of authenticity: Certificates verify that the contacted server is the expected server. This verification of authenticity thwarts imposters who attempt to steal trust for the purpose of disrupting network operations.
Data transmission security: Data encryption defeats hackers who would use listening devices to capture transmitting data.
The third and fourth bullets above are the security requirements configured by the SSL Toolset that is part of NiagaraAX 3.7 and later.
Copyright © 2000-2014 Tridium Inc. All rights reserved.