Security at Mitsubishi Electric Iconics Digital Solutions

At Mitsubishi Electric Iconics Digital Solutions (MEIDS), we strive to build products to meet the highest standards for security that our customers trust in their critical operations.

Security-Minded Solutions

Our products have a history of installation in extremely critical and secure applications and allow customers to operate their industrial, manufacturing, and mission-critical facilities utilizing the latest security technologies and protocols, as well as operational best practices. Additionally, our extensive use of OPC Unified Architecture security model secures communications, and its encryption ensures that data security is held to the highest standards.

Security Updates

To ensure the best protection, we provide patches for any discovered vulnerabilities with the utmost priority.

Security Vulnerability Reporting

We work with members of the independent security research community who find vulnerabilities so that security fixes can be issued to all customers.

Questions or Concerns?

Have any general questions or concerns about security? Get in touch with a member of our security team.

Leading Security Standards

We prioritize security at every stage of software development—implement encryption, certificate authentication, obfuscated and encrypted passwords, and strict access controls—to meet the highest security demands of modern systems.

Our multi-phase development lifecycle includes unit testing, integration testing, system testing, and performance testing, with security evaluations conducted at each stage. Every new feature undergoes per-feature security testing, including stress tests for vulnerabilities and access controls.

We enforce strict security measures during development, protecting code through digital safeguards and credential-based access. Our development team also continuously updates and reviews a security threat model to mitigate risks.

For secure product deployment, we offer a locked-down installation option, ensuring a hardened environment while maintaining flexibility for system administrators to configure system-to-system and system-to-client interfaces within a customer’s secure infrastructure.

 

Latest Security News

GENESIS Update 11.02 Now Available

Software Release | Mitsubishi Electric Iconics Digital Solutions | June 24, 2025

We’re excited to announce the release of GENESIS version 11.02, packed with powerful updates that enhance flexibility, efficiency, and connectivity while continuing to prioritize customer experience and innovation.

Read More 

GENESIS Update 11.01 Now Available

Software Release | Mitsubishi Electric Iconics Digital Solutions | April 10, 2025

We are pleased to announce the release of GENESIS version 11.01, marking a significant step forward in our commitment to delivering the most secure, reliable, and scalable SCADA automation software in the industry.

Read More 

February 2025 Critical Fixes Rollup Released

Software Release | ICONICS | February 18, 2025

10.97.3 Critical Fixes Rollup 2 is now available for download.

Read More 

Latest Security Blog Articles

Mitsubishi Electric Iconics Digital Solutions Has Its Customers’ Backs Through Continued & Proactive Security Investments

May 16, 2023

Kyle Reissner, Director, Product Management Engineering at Mitsubishi Electric Iconics Digital Solutions, reassures customers and users that the company has invested and will continue to invest and be proactive in the security of its automation...

Read More 

How to Solve Water Industry Challenges with Automation Technology and SCADA Solutions

June 3, 2022

Today, more than ever, the water industry faces serious challenges with an extremely outdated infrastructure and a lack of emergency preparedness and future resiliency. To know about the current prevalent challenges the water industry is facing...

Read More 

Inside the 2022 Pwn2Own Challenge: Lessons in Cyber Resilience

April 28, 2022

Mitsubishi Electric Iconics Digital Solutions participated in Pwn2Own Miami 2022, where ethical hackers tested the security of industrial software platforms—including GENESIS64. This blog shares what we learned from the Pwn2Own Challenge...

Read More