ICONICS
About
Learn about our company, leadership, and our worldwide presence. Get the latest ICONICS news and see which events you can find us at.
Solutions
Discover our extensive capabilities—ICONICS software provides solutions for a wide variety of customer and partner needs.
Industries
ICONICS software can be used in a variety of applications. Select your industry and see our tailored approach for your specific needs.
Products
Learn more about ICONICS’ broad range of automation software products by name or category.
Partners
Find out how to become an ICONICS Partner. Get in touch with your local Sales Channel or System Integrator.
Resources
Access ICONICS product trials, blog articles, whitepapers, success stories, and other collateral. Watch training videos or sign-up for an instructor-led class today.
Contact
Want to reach out to us? Get in touch with an ICONICS specialist at one of our worldwide offices.
Call Us: +1 (508) 543 8600
Total: ~6 min
The basics of how application and interface security is handled within the ICONICS platform. It discusses the differences between user based as well as system integration based security practices.
ICONICS uses features such as encryption, certificate authentication, user and system encrypted passwords, and obfuscation to provide the highest level of security demanded of today’s systems.
This video discusses some of the common security attacks and different considerations and counter measurements for securing data at rest, data in transit, DoS, and etc.