ICONICS
Learn about our company, leadership, and our worldwide presence. Get the latest ICONICS news and see which events you can find us at.
Discover our extensive capabilities—ICONICS software provides solutions for a wide variety of customer and partner needs.
ICONICS software can be used in a variety of applications. Select your industry and see our tailored approach for your specific needs.
Learn more about ICONICS’ broad range of automation software products by name or category.
Find out how to become an ICONICS Partner. Get in touch with your local Sales Channel or System Integrator.
Access ICONICS product trials, blog articles, whitepapers, success stories, and other collateral. Watch training videos or sign-up for an instructor-led class today.
Want to reach out to us? Get in touch with an ICONICS specialist at one of our worldwide offices.
Call Us: +1 (508) 543 8600
Total: ~6 min
The basics of how application and interface security is handled within the ICONICS platform. It discusses the differences between user based as well as system integration based security practices.
ICONICS uses features such as encryption, certificate authentication, user and system encrypted passwords, and obfuscation to provide the highest level of security demanded of today’s systems.
This video discusses some of the common security attacks and different considerations and counter measurements for securing data at rest, data in transit, DoS, and etc.