TSW-X60_Series_Hero_Residential_PR-1.jpg

Our commitment to security

Thousands of companies across hundreds of industries, government agencies, universities, and more have standardised on the kind of products we supply and install. They trust and rely on us to make their lives simpler and more successful every day. Central to that success is our unwavering commitment to network security. Simply put, “If it’s on the network, it must be secure.” Clients need to know who and what is on their network.

We set the gold standard for network security by leveraging the most advanced technologies including 802.1x authentication, AES encryption, Active Directory® credential management, JITC Certification, SSH, secure CIP, PKI certificates, TLS, and HTTPS, among others, to provide network security at the product level. Many enterprise IT departments categorise devices that don’t support these features as a security risk. Quite simply, our products security feature set is unmatched in the industry:

 

  • AES Encryption
    Ensures secure transmissions. The same protocol banks use to protect transactions on the Internet.

     

  • 802.1x Authentication
    Ensures that every device on the network is explicitly authorised by the IT department.

     

  • Active Directory®

Centralised credential management ensures that only authorised users gain access.

  • JITC Certification
    Our products have received approval by the Joint Interoperability Test Command (JITC) of the U.S. Department of Defense Information Systems Agency (DISA) and have been added to the Unified Capabilities (UC) Approved Products List (APL).

  • PKI Authentication
    Required when simple passwords are inadequate to confirm the identity of the parties involved in a particular action or communication, and to validate the information being transferred.

  • TLS
    The most widely used security protocol, TLS provides privacy and data integrity between two applications communicating over a network.

  • SSH Network Protocol
    Encrypts and protects communications, whereas Telnet, used in other Network AV products, does not.

  • HTTPS
    The secure version of HTTP, HTTPS encrypts the data sent between your web browser and the website you’re connected to, ensuring the privacy and integrity of the exchanged data. The “S” at the end of HTTPS stands for “Secure.”

  • Secure CIP
    Ensures communications between control processors and distributed media devices are secure. 

Thousands of companies across hundreds of industries, government agencies, universities, and more have standardised on our type of products. They trust and rely on companies like ours to make their lives simpler and work/ education environments secure. Central to that success is our unwavering commitment to network security. Simply put, “If it’s on the network, it must be secure.” Clients need to know who and what is on their network.


Our process

A secure system, of course, doesn’t just happen. There are large number of considerations that need to be accounted for throughout the development process. We allocate and dedicate resources to define the problem spaces and document the appropriate solutions.

Step 1 - Identifying risks that are applicable to the systems and identifying assumptions about the operating environment.

Step 2 - All source code is reviewed to ensure not only proper functionality, but also conformance to security guidelines.

Step 3 - Source code is subjected to scans using automated tools that review code for common errors and security holes.

Step 4 - A rigorous testing process is in place once the software/firmware is compiled and loaded into systems. Each night, the latest code is built and automated tests are run to ensure system stability. Included in these tests are standard network scanning tools to ensure there are no unauthorised ports, etc. which have been open.