Data Secure with ThinManager

Using ThinManager – Safety and Security

Data Security – not just a buzzword.  Today we know all too well that our data is important and keeping it secure and safe is often even more important.

This video focuses on the security and data safety in ThinManager.  ThinManager gives you complete control in your production environment over who sees what, where and when.  Secure data management has always been in the forefront when creating ThinManager. Our location-based resolvers create “Geo-Fences” for total security when integrating mobility in to your production environment. [...]

Authenticate Your Way

User Authentication with ThinManager

With so much sensitive data and information out there in your network applications and tech these days, security and proof of identity are of the utmost importance.  When people think security with technology they think first about user authentication.  Most likely they think usernames and passwords, maybe pass-codes as on most mobile devices.

In a modern factory or production environment using ThinManager, there are several options at your disposal to make user authentication fast and amazingly safe and secure.  ThinManager syncs with your existing Windows network Active Directory to provide an easy entry to your users and user authentication. [...]

Operator Using Camera

Increase Visualization with IP Cameras

When you think about IP Cameras in your work environment, what comes to mind?  You might think of monitoring safety and security of the facility.  That is a completely valid thought.  For many facilities that is likely the main reason that cameras were put in to place.

IP Camera use, especially in the last 5 years, has given way to much more.  A new focus in a modern production environment is “increased visualization”.  Increasing visualization can spawn from anything that makes you more productive by way of seeing more information.  The use of cameras allows you to have an in-depth feel for an environment, not just a view of the screen at the terminal. [...]

MailBag Friday (#44)

Every Friday, we dedicate this space to sharing solutions for some of the most frequently asked questions posed to our ThinManager Technical Support team.  This weekly feature will help educate ThinManager Platform users and provide them with answers to questions they may have about licenses, installation, integration, deployment, upgrades, maintenance, and daily operation.  Great technical support is an essential part of the ThinManager Platform, and we are constantly striving to make your environment as productive and efficient as possible. [...]

MailBag Friday (#29)

Every Friday, we dedicate this space to sharing solutions for some of the most frequently asked questions posed to our ThinManager Technical Support team.  This weekly feature will help educate ThinManager Platform users and provide them with answers to questions they may have about licenses, installation, integration, deployment, upgrades, maintenance, and daily operation.  Great technical support is an essential part of the ThinManager Platform, and we are constantly striving to make your environment as productive and efficient as possible. [...]

Real Security Is About Prevention Not Recovery

Over the last few months, we have been hearing more and more about the Stuxnet Worm.  Originating in 2007, it became a topic of conversation in the main stream media after its global deployment in 2010.  At the time, Symantec reported that less than 2% of all known Stuxnet infections were on machines in the United States.  Now, almost two years later, it is once again front and center for both its relationship to the newly discovered Flame malware, and recent surge in infecting new networks and machines. [...]

ThinManager Helps You Avoid the Stuxnet Virus

There is a new villain in the computer virus world and it is from the Stuxnet family of malware.  The Stuxnet attack exploits a vulnerability in Microsoft Windows software, WinCCConnect, which is an integral component of the distributed control and SCADA systems that facilitate production operations in many process-manufacturing companies. The vulnerability would allow the virus to extract process data and possibly HMI screens.

The director and chief economist of the independent watchdog The US Cyber Consequences Unit Scott Borg says “Either the attacker is planning on stealing very valuable information or they are going to use this access to the control system to do bad things.” The virus’s purpose seems to be what can only be termed as industrial espionage as attackers could steal information on how plants are run to possibly extort money or influence manufacturers by taking away the competitive edge with the information obtained. [...]

Top 10 Advantages to Using ThinManager

We all know that ThinManager is great, but do you know all the ways ThinManager can help you?  Here are the top 10 advantages of using ThinManager:

1.  Security: ThinManager knows the best security is not letting the problem close enough to be an issue, so we’ve created a secure environment. Terminal Servers can be secured away from public access, USB ports are closed by default and there are no CD or floppy drives to compromise security.  With TermSecure™ we added a second level of security with features like having users access and privileges controlled by administrator, an Auto-login option, and a key blocking module. [...]