Skip to main content

System Security Practices

Various techniques can be used to make systems more secure, including:

  • Using an air-gapped topology (no direct internet access). See Isolated LAN for example illustrations.

  • Only using devices that do not have integrated Wi-Fi or Bluetooth.

  • Locating equipment racks restricted-access areas.

  • Using KVM extenders so that I/O connectors are not locally available.

  • Blocking unused switch ports.

  • Enforcing MAC address white-listing.

  • Using fiber instead of copper to interconnect devices.

  • Using secure isolators between devices.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.