Your Network Security - Control Who, What, Where, and When Access Is Allowed

ACCESS CONTROL AND POLICY MANAGEMENT

You need to prevent access violations of unauthorized users and minimize the potential exposure to threats from internal resources. You can control access and implement policies to determine who, what, where, and when access is allowed to our applications and control system equipment. 

  • Centrally manage user authentication and authorization of user permissions with FactoryTalk® Security
  • Integrate management user accounts with Active Directory
  • Leverage scalable solutions for flexible workflows around disconnected environments, guest user access, temporary priveledge escalation, and more.
  • Harden applications by limiting the usage of tags with Data Access Control

It’s important to control who is permitted to do what from where. FactoryTalk Security provides centralized authentication and access control by verifying the identity of each user who attempts to access the automation system.

  • Controls access to specific controllers with FactoryTalk Security with Security Authority Binding

  • Provides user access controls and role-based security to Controllers, HMI and Software

  • Communicates with FactoryTalk® Directory to determine what the user is and isn’t permitted to do

FIND OUT MORE BELOW:

Website:  http://www.rockwellautomation.com/global/capabilities/industrial-security/overview.page?pagetitle=Security-Products&docid=dd1f7066bf6aac5b1461757f29d35b01

Industrial Security:  http://literature.rockwellautomation.com/idc/groups/literature/documents/br/secur-br001_-en-p.pdf

If you would like to see a training video on FactoryTalk Security: Email justin@cedinsider.com

-----------------

ASSESS YOUR LEVEL OF SECURITY

Understand the Security Threats and How to Mitigate Them

Use this Security Assessment Tool to help you benchmark your current industrial security level of risk. You can compare yourself against other organizations in your industries, and start identifying methods to mitigate potential security risks.

Assess Your Security Risk

----------------

Getting IT and OT on the same page is critical to any successful security and network solutions:

http://www.rockwellautomation.com/global/news/blog/detail.page?pagetitle=Getting-IT-and-OT-on-the-Same-Page&content_type=blog&docid=d8c2d3a3a69651e52d8735d0ab9bdc58

Rockwell Automation
Back to Posts

Archives