Security
at its best
Intrusion protection: separates IT and machine network using physically separate Ethernet interfaces.
Password-protected data access management.
Configurable data sharing via separate permissions on control and IT level.
Strict data encryption and user authentication.