The ultimate purpose here is to authenticate users and to grant permission to make certain changes. Centralized user administration provides the assurance of sufficiently robust passwords and the tracking of invalid logins.
Port security can be achieved using the RADIUS protocol or by assigning permanent MAC addresses. In addition, unneeded services (Web servers, FTP, remote access, etc.), interfaces (USB, Firewire, WLAN, etc.), and ports (Ethernet, PROFINET) should be deactivated. This prevents unnecessary gaps in protection and reduces the amount of communication to be monitored. Measures to protect intellectual property or to prevent unauthorized access can be easily implemented in our configuration programs.
The connected PCs are protected using anti-virus software. Whitelists limit the executability of programs to applications classified as secure. Unneeded services (Web servers, FTP, remote access, etc.), interfaces (USB, Firewire, WLAN, etc.), and ports (Ethernet, Profinet) should be blocked to avoid creating unnecessary and, in particular, unmonitored vulnerabilities. Periodic patches and updates ensure that the protective measures are always up-to-date.