All Webinar Recordings
Checklist for Setting Up SCALANCE Devices
140 views
In terms of security operation, some security-relevant settings should be made at the SCALANCE device to prevent unauthorized access via the network. This checklist will help you with implementation.
Very often, SCALANCE devices with default settings or active, but unused functions are integrated into the OT infrastructure. Thus, unauthorized users might access the modules and cause damage. Join us to learn about these security settings and how implementing them can prevent unauthorized users from damaging your system.