Our products feature an expansive set of cyber hardened features, built from the ground up to support the most stringent cyber requirements.
All user actions and important system activity, including maintenance actions and system faults (with state), are logged and stored in a non-volatile system log file. The device will report a fault if anomalies are detected
Logging system can forward logs to a remote System Log (SysLog) Server.
Provide a hash of the firmware image and all user configuration files on request