ProSoft Insights / Technology focus

Your IT Team Will Love ProSoft Connect’s Latest Security Updates

Search Insights

Categories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Improving Robotic Carriers’ Connectivity in Logistics Applications

21 ene, 2022 / Technology focus

Many distribution centers use automated robotic carriers to quickly move items through ...

OEM enables double-check on mining machine’s position

15 dic, 2021 / Application stories

A machine builder needed two independent sources of position, timing, and velocity data...

Your IT Team Will Love ProSoft Connect’s Latest Security Updates

02 dic, 2021 / Technology focus

The Zero Trust security model endorsed by the NSA advises continuous verification. Find...

DNP3 Solutions Help You Increase Data Integrity

18 nov, 2021 / Product focus

The DNP3 industrial protocol helps ensure data integrity for utilities, among other app...

Your IT Team Will Love ProSoft Connect’s Latest Security Updates

Earlier this year, the National Security Agency issued guidance on how organizations can embrace a “Zero Trust” security model.

Put simply, this concept is predicated on the idea that security threats exist both inside and out of an organization, and that there shouldn’t be implicit trust in any part of the network (whether an employee or a device). It advocates for policies and systems that allow for continuous verification from more than one source.

It’s all very cheery, we know. But it’s a realistic view of what companies worldwide need to consider to increase network security, especially as many functions continue to be handled remotely.

How we’re helping Connect users move toward a ‘Zero Trust’ model

ProSoft Connect is ProSoft’s remote connectivity service, and it aims to help you securely access your remote equipment – with no software or platform maintenance required on your part. ProSoft Connect is designed to be SMART – Secure, Managed, Accessible, Reliable, Trusted – and our latest security updates to the service will help align it with your IT team’s objectives.

These updates are available for companies with ProSoft Connect subscriptions through a Power User Plan or the use of the Persistent Data Network. The first update gives your organization the freedom to choose among three options for how logins are handled:

∙ The newest selection a company can make is to build and enforce their own password policy, including the option for two-factor authentication, which we highly recommend. Enforcing your own policy here is a simple process, in which you’ll choose password requirements. Your team will be familiar with this as well (who hasn’t put together a very specific mix of typed characters?):

Connect password policy

∙ Another option that’s available is the existing Single Sign-On (SSO) selection. SSO allows for the same login credentials to be used securely across applications that employees use as a member of your organization. This option also allows for a more streamlined credential update in the case of new passwords or personnel changes.

∙ The third option is ProSoft Connect’s standard login process, which uses two-factor authentication.

These options for logging in essentially comprise Step 1 in a Zero Trust setup within ProSoft Connect – the verification that the user needs to provide in order to log in to the service as a member of your organization.

Once the employee has logged in as a verified user, there’s Step 2 – you can ensure they have access to just what they need to see. This can be handled by your organization’s admin user, and may be set up as:

∙ Limited gateway access to prevent unwanted or unintentional access to additional assets

∙ Different levels of user access to prevent unwanted or intentional configuration changes

∙ Allowed IP settings to prevent unwanted or unintentional access to additional assets

A third step is verification that users are only accessing what they need to, when they need to. This is managed with the Virtual Lockout-Tagout (vLOTO™) feature, and it can also be used to control access for third-party vendors, including machine builders and system integrators.

Audit log updates

In addition to the updated login flexibility, we’ve also upgraded subscriber organizations’ audit log functions:

∙ Your organization’s audit log can now be exported on an automatic, regular cadence, and stored indefinitely. This information can be sent as a downloadable email to your organization’s administrator or as a CSV file to the SFTP server, and can be used if needed for future forensic analysis.

∙ The audit log can now also capture more information when users log in. Previously, the audit log captured the login ID and time. Now, the audit log can also note the user’s IP address and browser information, in the instance your IT security expert needs this information for forensic analysis.

Contact us to learn more about secure remote connectivity via ProSoft Connect, and our “try before you buy” program for cellular and wired gateways, which are monitored via the service.