Software Toolbox Technical Blog

OPC Connectivity & Security Concerns in IT/OT Convergence

6 min read

By John Weber on Dec 20, 2016 2:00:00 PM


Complications of Domains, Workgroups, & Mixed Windows Versions & Solutions

In the Operations Technology or OT world that most of our users live in, it’s normal to have multiple versions of Windows and systems that may not always be setup consistently but we have to make it all work anyway.   Connecting OPC clients and servers when the Windows computers are not on the same version, not in an Active Directory or, using older terminology, a domain, and having everything work well takes skill, and keeping it secure involves a lot of details.

In this blog post, our team asked me to explore with you the details involved to assist you with better understanding Windows Security and to converse more productively with your IT Team.  I’ll also share how you can learn more about how to make things easier on yourself through the use of OPC UA or with Tunneling.

Continue Reading

Can You Tunnel Remote Data Without Opening the Firewall?

2 min read

By Win Worrall on Sep 7, 2016 1:00:00 PM


The more regulated your industry, the more likely it is that you have a cybersecurity team that is extremely vigilant about gaps in security.  Traditionally, remote OPC tunneling has generally always required that network firewalls have at least one port open for data transfers to work successfully.

But what if you work in one of these highly regulated industries and your IT/cybersecurity department won't allow you to open any firewall ports for remote data sharing?

This blog post will discuss why it's important for a tunneler solution to support alternatives to the traditional methods of tunneling with open firewall ports to ensure network integrity.

Continue Reading

How should a tunneler handle network security?

2 min read

By Win Worrall on Apr 5, 2016 1:14:18 PM


This is Part 2 of our “25 Things to Consider when Choosing an OPC Tunnel” series. How does the tunneler handle security?

Security is an integral consideration when choosing a tunneling solution.  This blog will cover some important aspects of security to consider when evaluating different tunneling solutions.

Continue Reading

About this Blog

We're engineers like you, so this blog focuses on "How to" appnotes, videos, tech team tips, product update announcements, user case studies, and other technical updates.  Subscribe to updates below. Your feedback and questions on posts are always welcomed - just use the area at the bottom of any post.

Subscribe to our Blog

Recent Posts

Posts by Topic

See all