ProSoft Insights

Search Insights

Categories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Your IT Team Will Love ProSoft Connect’s Latest Security Updates

02 Dec, 2021 / Technology focus

The Zero Trust security model endorsed by the NSA advises continuous verification. Find...

DNP3 Solutions Help You Increase Data Integrity

18 Nov, 2021 / Product focus

The DNP3 industrial protocol helps ensure data integrity for utilities, among other app...

Easily Extract Field Data with the XLReporter Connector for the Data Logger Plus

04 Nov, 2021 / Product focus

We’ve paired up with SyTech to create a ProSoft connector for the Data Logger Plus, ena...

Reliably Connect Your CPG Application

21 Oct, 2021 / Product focus

There are some global issues that are out of consumer packaged goods (CPG) manufacturer...

Your IT Team Will Love ProSoft Connect’s Latest Security Updates

By Vishal Prakash – Strategic Product Manager Filed in Technology focus, Remote Connectivity

The Zero Trust security model endorsed by the NSA advises continuous verification. Find out how ProSoft Connect’s latest updates help you control user verification within your organization.

Read more

DNP3 Solutions Help You Increase Data Integrity

By Lauren Robeson Menting – Senior Marketing Communications Specialist Filed in Product focus, Gateways Oil and Gas Wastewater Water

The DNP3 industrial protocol helps ensure data integrity for utilities, among other applications. Find out how you benefit from using this open protocol, and get the details on ProSoft’s new DNP3 solution.

Read more

Easily Extract Field Data with the XLReporter Connector for the Data Logger Plus

By Vishal Prakash – Strategic Product Manager Filed in Product focus, Remote Connectivity

We’ve paired up with SyTech to create a ProSoft connector for the Data Logger Plus, enabling reports’ creation through XLReporter. Learn more about this updated way to extract data from your field devices.

Read more

Reliably Connect Your CPG Application

By Lauren Robeson Menting – Senior Marketing Communications Specialist Filed in Product focus, Automated Material Handling Food and Beverage Logistics

There are some global issues that are out of consumer packaged goods (CPG) manufacturers’ hands. But real-time connectivity can benefit applications involving AGVs and automated storage and retrieval systems; logistics facilities or warehouses; and bottling machines.

Read more

In-Rack IEC 61850 Solution Connects Power Protection Equipment to ControlLogix® System

By Lauren Robeson Menting – Senior Marketing Communications Specialist Filed in Product focus, In-chassis Power and Energy

Rockwell Automation and ProSoft Technology are excited to announce the first in-rack IEC 61850 client module for ControlLogix® PACs. The new module integrates seamlessly with a library of electrical protection devices from Rockwell Automation.

Read more

Your Guide to Water and Wastewater Connectivity and Security

To make automation work in your water and wastewater application, connectivity and data integrity are essential. This application guide walks you through considerations to address connectivity needs and tactics for different parts of your water and wastewater plants, and how to improve your application’s cybersecurity posture.

Read more