Security by Design

Security By Design

No exposure of the plant network

Using no VPNs means no extension of the plant’s security network. DHTP can work seamlessly within network proxies, data proxies and DMZ servers.

No disruptions from the IT network

Read-only options and non-intrusive connectivity ensure that the plant remains secure and functional, even if remote data access is degraded or a remote location is compromised.

No access beyond the required data

The plant decides which data to make available remotely.

No compromise on performance

Real-time data is delivered at microseconds above network latency, easily scaling to 50,000+ data point changes per second, all the while preserving the data model across networks.

One-way or bidirectional data flow

Each connection can be configured as read-only or read-write, to support data monitoring or supervisory control.

No high cost

By reducing these security hurdles, Skkynet reduces security costs.

Secure Plant to Cloud

Skkynet Security Plant To Cloud

* Arrows illustrate initial connection path; all connections enable bi-directional data

Access plant data securely

Works seamlessly within network proxies, data proxies and DMZ servers. MQTT provides outbound connection from DMZ to the cloud.

One-way or bidirectional data flow

Supports supervisory control data from the cloud back to the plant, for any cloud service that allows it.

Easy connections to popular cloud services

Pre-configured support for Azure IoT Hub, Google IoT, and Amazon IoT Core.  Also connects to any MQTT broker, like RabbitMQ or Mosquitto.

SkkyHub connections

Full integration with Skkynet’s SkkyHub cloud service.  Make plant-to-cloud and cloud-to-cloud connections.

Security by Design for Industrial IoT

Skkynet Security For IIoT

* Arrows illustrate initial connection path; all connections enable bi-directional data

Secure cloud service as DMZ

Get the performance of a DMZ in the cloud by using SkkyHub, our secure cloud service that only accepts connections from the DataHub or ETK.

Cloud service as conduit

No longer just a data collector, the cloud becomes a dynamic service for sharing data between remote devices or facilities.

Secure Embedded Toolkit (ETK)

With the ETK, data on embedded devices can be sent to the DataHub or SkkyHub via DHTP, using no VPNs and keeping all firewall ports closed.

Zero attack surface

All remote connections are outbound, so no inbound firewall ports are opened. Zero attack surface means zero attacks.