ProSoft Insights / Technology focus

Your IT Team Will Love Belden Horizon's Latest Security Updates

Search Insights

Categories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Attain Reliable Connectivity for Your Mining Application

11 Apr, 2024 / Technology focus

Discover how you can gain reliable connectivity in your mining or metals application. C...

Latest Belden Horizon Updates Prioritize Flexibility

21 Mar, 2024 / Product focus

New updates include on-prem deployment and Layer 3 IP Routing functionality. Get the de...

Modernization Gateway Updates that Help Improve Your Facility

26 Feb, 2024 / Product focus

Get the latest information on ProSoft’s modernization gateways – two new modules have a...

Gather Field Data with New Modbus Router

08 Feb, 2024 / Product focus

Your field devices have essential data that can help identify problems, enable predicti...

Your IT Team Will Love Belden Horizon's Latest Security Updates

Earlier this year, the National Security Agency issued guidance on how organizations can embrace a “Zero Trust” security model.

Put simply, this concept is predicated on the idea that security threats exist both inside and out of an organization, and that there shouldn’t be implicit trust in any part of the network (whether an employee or a device). It advocates for policies and systems that allow for continuous verification from more than one source.

It’s all very cheery, we know. But it’s a realistic view of what companies worldwide need to consider to increase network security, especially as many functions continue to be handled remotely.

How we’re helping Belden Horizon users move toward a ‘Zero Trust’ model

Belden Horizon is our remote connectivity service, and it aims to help you securely access your remote equipment – with no software or platform maintenance required on your part. Belden Horizon is designed to be SMART – Secure, Managed, Accessible, Reliable, Trusted – and the latest security updates to the service will help align it with your IT team’s objectives.

These updates are available for companies with Belden Horizon subscriptions through a Power User Plan or the use of the Persistent Data Network. The first update gives your organization the freedom to choose among three options for how logins are handled:

∙ The newest selection a company can make is to build and enforce their own password policy, including the option for two-factor authentication, which we highly recommend. Enforcing your own policy here is a simple process, in which you’ll choose password requirements. Your team will be familiar with this as well (who hasn’t put together a very specific mix of typed characters?):

Connect password policy

∙ Another option that’s available is the existing Single Sign-On (SSO) selection. SSO allows for the same login credentials to be used securely across applications that employees use as a member of your organization. This option also allows for a more streamlined credential update in the case of new passwords or personnel changes.

∙ The third option is Belden Horizon's standard login process, which uses two-factor authentication.

These options for logging in essentially comprise Step 1 in a Zero Trust setup within Belden Horizon – the verification that the user needs to provide in order to log in to the service as a member of your organization.

Once the employee has logged in as a verified user, there’s Step 2 – you can ensure they have access to just what they need to see. This can be handled by your organization’s admin user, and may be set up as:

∙ Limited gateway access to prevent unwanted or unintentional access to additional assets

∙ Different levels of user access to prevent unwanted or intentional configuration changes

∙ Allowed IP settings to prevent unwanted or unintentional access to additional assets

A third step is verification that users are only accessing what they need to, when they need to. This is managed with the Virtual Lockout-Tagout (vLOTO™) feature, and it can also be used to control access for third-party vendors, including machine builders and system integrators.

Audit log updates

In addition to the updated login flexibility, we’ve also upgraded subscriber organizations’ audit log functions:

∙ Your organization’s audit log can now be exported on an automatic, regular cadence, and stored indefinitely. This information can be sent as a downloadable email to your organization’s administrator or as a CSV file to the SFTP server, and can be used if needed for future forensic analysis.

∙ The audit log can now also capture more information when users log in. Previously, the audit log captured the login ID and time. Now, the audit log can also note the user’s IP address and browser information, in the instance your IT security expert needs this information for forensic analysis.

Contact us to learn more about secure remote connectivity via Belden Horizon, and our “try before you buy” program for cellular and wired gateways, which are monitored via the service.