Total: ~6 min

The basics of how application and interface security is handled within the ICONICS platform. It discusses the differences between user based as well as system integration based security practices.

Overview of Securing ICONICS Systems

ICONICS uses features such as encryption, certificate authentication, user and system encrypted passwords, and obfuscation to provide the highest level of security demanded of today’s systems.

Common Approaches to Security

This video discusses some of the common security attacks and different considerations and counter measurements for securing data at rest, data in transit, DoS, and etc.