SSNC’s technology is always towards the security of our customers. We focus on detecting, analyzing, and monitoring vulnerabilities across systems and networks.
PC Management with a single solution. Perfectly secure industrial PCs. Nexplant OT Viewer allows you to centrally manage and control all industrial PCs from a single location. Stay protected from security threats and manage the manufacturing system efficiently with Nexplant OT Viewer’s unauthorized S/W, storage device control, packaged software deployment and remote client control functionalities.
Diagram & Features
Features
Vulnerability assessment
Device control
Program Deployment and S/W Patch
Controlling unauthorized programs
USB/IP PORT control
Funtions
Process Control
• Support the Whitelisting/Blacklisting approach and choose between the two depending on the manufacturing environment.
• Remote service support
Automatically deploy the required programs and security files and maintain the up-to-date version by managing S/W patch
• 40 to 80% better than before
Malicious Process Control
• Supports both Whitelist/Blacklist methods
• In order to prevent damage caused by malicious code execution, it checks the process through Virus engine and decides the use, and controls the use of malicious programs.
Device Control
• Control Key Issuance & Authorization
and USB Registration & Use and configure
a portable device(MTP) to be allowed.
IP/PORT Control
• Control the specific PC’s Inbound/
Outbound Ports to secure the network.
Diagram & Features
Features
Vulnerability assessment.
Device control
Program Deployment and S/W Patch
Controlling unauthorized programs
USB/IP PORT control
Functions
Process Control
• Support the Whitelisting/Blacklisting approach and choose between the two depending on the manufacturing environment.
• Remote service support
Programs Deployment and S/W patch
• Automatically deploy the required programs and security files and maintain them in an the up-to-date version by managing the S/W patch
Malicious Process Control
• Supports both Whitelist/Blacklist methods
• To prevent damage caused by malicious code execution, it checks the process through the Virus engine and decides the use, and controls the use of malicious programs.
Device Control
• Control Key Issuance & Authorization and USB Registration & Use and configure a portable device(MTP) to be allowed.
IP/PORT Control
• Control the specific PC’s Inbound/Outbound Ports to secure the network.