Security at ICONICS

At ICONICS, we strive to build products to meet the highest standards for security that our customers trust in their critical operations.

Security-Minded Solutions

ICONICS products have a history of installation in extremely critical and secure applications and allow customers to operate their industrial, manufacturing, and mission-critical facilities utilizing the latest security technologies and protocols, as well as operational best practices. Additionally, ICONICS extensive use of OPC Unified Architecture security model secures communications, and its encryption ensures that data security is held to the highest standards.

Security Updates

To ensure the best protection, ICONICS provides patches for any discovered vulnerabilities with the utmost priority.

Security Vulnerability Reporting

ICONICS works with members of the independent security research community who find vulnerabilities so that security fixes can be issued to all customers.

Questions or Concerns?

Have any general questions or concerns about security? Get in touch with a member of our security team.

Leading Security Standards

ICONICS uses encryption, certificate authentication, user and system encrypted passwords, and obfuscation to provide the highest level of security demanded for today’s systems. ICONICS employs a multi-step review process across many phases of the software development lifecycle and utilize a multi-phase development lifecycle that includes unit testing, integration testing, system testing, and performance testing. Security testing is conducted on a per-feature basis for new functionality, including stress tests for security and controls.

Additionally, ICONICS employs tight security measures during the development stage by protecting its code digitally and requiring specific credentials to access different parts of the code. The ICONICS development team also maintains and regularly reviews a security threat model for the ICONICS software. ICONICS also offers a secure option on its product installations that provides a locked-down and secure environment. Lastly, for ease of installation, ICONICS makes any system extremely flexible for the system administrator so that all system-to-system and system-to-client interface parameters can be adjusted to work within a customer’s secure infrastructure.

Latest Security News

October 2023 Critical Fixes Rollups Released

Software Release | ICONICS | října 19, 2023

10.97.1 Critical Fixes Rollup 4 is now available for download.

Read More 

ICS-CERT Advisory Issued, July 2022

Security Update | ICONICS | července 21, 2022

ICS-CERT has worked with ICONICS to issue an advisory disclosing several vulnerabilities in the ICONICS Suite software, including those reported at ZDI’s Pwn2Own Miami 2022. Learn about the mitigation recommendations for these vulnerabilities.

Read More 

Gmail Updates Require ICONICS Software Reconfiguration

Security Update | ICONICS | července 19, 2022

Changes to Gmail have caused incompatibilities with ICONICS software that include CFSWorX, AlertWorX and AlarmWorX64 Multimedia products. To restore compatibility, use an “app password” or upgrade in order to configure OAuth 2.0.

Read More 

Latest Security Blog Articles

ICONICS kryje záda svým zákazníkům díky neustálým a proaktivním investicím do bezpečnosti

května 16, 2023

Kyle Reissner, ředitel ICONICS, Product Management Engineering, ujišťuje zákazníky a uživatele, že ICONICS investovala a nadále bude investovat do proaktivního zabezpečení svého automatizačního softwaru a systémů. Vysvětluje, jak ICONICS dodržuje...

Read More 

Automatizační technologická řešení pro výzvy vodního průmyslu v roce 2022

června 3, 2022

Vodárenský průmysl dnes více než kdy jindy čelí vážným problémům s extrémně zastaralou infrastrukturou a nedostatečnou připraveností na mimořádné události a budoucí okolnosti. Určit současné výzvy, kterým vodohospodářský průmysl čelí, a jak je...

Read More 

Jak společnost ICONICS získala zásadní bezpečnostní statistiky prostřednictvím soutěže Pwn20wn Miami 2022 Ethical Hacking Competition

dubna 28, 2022

Minulý týden proběhla etická hackerská soutěž Pwn2Own Miami 2022 sponzorovaná iniciativou Zero Day Initiative. Etičtí hackeři neboli „bezpečnostní...

Read More