Security at Mitsubishi Electric Iconics Digital Solutions

At Mitsubishi Electric Iconics Digital Solutions (MEIDS), we strive to build products to meet the highest standards for security that our customers trust in their critical operations.

Security-Minded Solutions

Our products have a history of installation in extremely critical and secure applications and allow customers to operate their industrial, manufacturing, and mission-critical facilities utilizing the latest security technologies and protocols, as well as operational best practices. Additionally, our extensive use of OPC Unified Architecture security model secures communications, and its encryption ensures that data security is held to the highest standards.

Security Updates

To ensure the best protection, we provide patches for any discovered vulnerabilities with the utmost priority.

Security Vulnerability Reporting

We work with members of the independent security research community who find vulnerabilities so that security fixes can be issued to all customers.

Questions or Concerns?

Have any general questions or concerns about security? Get in touch with a member of our security team.

Leading Security Standards

We prioritize security at every stage of software development—implement encryption, certificate authentication, obfuscated and encrypted passwords, and strict access controls—to meet the highest security demands of modern systems.

Our multi-phase development lifecycle includes unit testing, integration testing, system testing, and performance testing, with security evaluations conducted at each stage. Every new feature undergoes per-feature security testing, including stress tests for vulnerabilities and access controls.

We enforce strict security measures during development, protecting code through digital safeguards and credential-based access. Our development team also continuously updates and reviews a security threat model to mitigate risks.

For secure product deployment, we offer a locked-down installation option, ensuring a hardened environment while maintaining flexibility for system administrators to configure system-to-system and system-to-client interfaces within a customer’s secure infrastructure.

 

Latest Security News

February 2025 Critical Fixes Rollup Released

Software Release | ICONICS | February 18, 2025

10.97.3 Critical Fixes Rollup 2 is now available for download.

Read More 

July 2024 Critical Fixes Rollup Released

Software Release | ICONICS | July 9, 2024

10.97.3 Critical Fixes Rollup 1 is now available for download.

Read More 

October 2023 Critical Fixes Rollups Released

Software Release | ICONICS | October 19, 2023

10.97.1 Critical Fixes Rollup 4 is now available for download.

Read More 

Latest Security Blog Articles

ICONICS Has Its Customers’ Backs Through Continued & Proactive Security Investments

May 16, 2023

Kyle Reissner, ICONICS Director, Product Management Engineering, reassures customers and users that ICONICS has invested and will continue to invest and to be proactive in the security of its automation software and systems. He explains how...

Read More 

How to Solve Water Industry Challenges with Automation Technology and SCADA Solutions

June 3, 2022

Today, more than ever, the water industry faces serious challenges with an extremely outdated infrastructure and a lack of emergency preparedness and future resiliency. To know about the current prevalent challenges the water industry is facing...

Read More 

How ICONICS Gained Crucial Security Insights Through the Pwn2Own Miami 2022 Ethical Hacking Competition 

April 28, 2022

Sponsored by the Zero Day Initiative, Pwn2Own Miami 2022 ethical hacking competition took place last week. Ethical hackers, or “security researchers...

Read More