Our products feature an expansive set of cyber hardened features, built from the ground up to support the most stringent cyber requirements.

  • All user actions and important system activity, including maintenance actions and system faults (with state), are logged and stored in a non-volatile system log file.  The device will report a fault if anomalies are detected
  • Logging system can forward logs to a remote System Log (SysLog) Server. 
  • Provide a hash of the firmware image and all user configuration files on request