Registro MyAdvantech

MyAdvantech é um portal personalizado para clientes Advantech. Se tornando um membro Advantech, você pode receber as últimas novidades de produtos, convites para webinars e ofertas eStore especiais.

Faça seu registro para ter acesso rápido às informações da sua conta 24 horas por dia, 7 dias por semana.


Although connectivity allows one to more easily access all network components, perform monitoring tasks, and troubleshoot any problem on a network, it also provides a means for unscrupulous attackers to obtain trade secrets or even money. Such open connectivity also means that even local networks are no longer closed and safe, and as the number of people relying on a network to perform their job duties increases, the level of remote access permission that is required will continue to grow as people become more dependent on cloud services.


Information shown on monitors and panels in control rooms is derived from data received from upstream edge components. This provides an opportunity for hackers to intrude a network via the edge components or switches/routers in a typical bottom-up intrusion, which, in addition to potential loss of trade secrets, can lead to a range of system problems resulting from zombie attacks, distributed denial-of-service (DDoS) attacks, or spoofing. This is why security continues to be of great concern in IIoT applications. Hence, determining the means to detect, predict, and prevent an intrusion or attack is the key point of cyber security.