Part 13 – Application Security

Part 13 – Application Security

Secure Your Network Infrastructure with Industrial HiVision Access Control

Are you responsible for the smooth running of your network infrastructure? Do you want to ensure that only authorized personnel have access to the powerful configuration tool, Industrial HiVision? Look no further than our informative video on Industrial HiVision Access Control.

In this video, we’ll take you on a journey through the various methods of access control available in Industrial HiVision. As a network administrator, it’s essential to control who has access to the application. Industrial HiVision offers various methods of access control, making it easy to integrate with your corporate security standards seamlessly.

Not only is Industrial HiVision a powerful tool for network configuration, supervision, and reporting, but it also provides flexible user account and permission settings tailored to suit your security requirements. At the most basic level, Industrial HiVision can operate without user accounts. However, for more advanced security, user accounts can be created to force a login to Industrial HiVision. Roles with assigned permissions can then be allocated to individual user accounts, providing a customized approach to network management.

For larger installations, especially where IT/OT convergence is taking place, another approach may be required. Some companies require a single sign-on per user, allowing one set of credentials to provide access to all corporate applications. Industrial HiVision achieves this by allowing users to authenticate via LDAP or RADIUS, providing consistent authentication techniques that can match your specific requirements.

As a network administrator, you are responsible for the smooth running of your network infrastructure, and it’s important to ensure that all employees who work with the network are accountable for their actions. Standard event logs provide information about the network history, but these logs are not intended to be secure. Industrial HiVision’s audit trail provides a permanent record of events relevant to the application, including the user who caused the event. This ensures that if you ever need to prove what occurred on your network, the information is readily available.

Join us on this informative journey through the various methods of access control available in Industrial HiVision and secure your network infrastructure today.

Login

To see our training, login to your account today!

Related Training Videos

Part 01 – Overview

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Part 02 – Architecture

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Part 03 – Topology

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.