Security by Design
The only closed-firewall solution for networking process data.
The only closed-firewall solution for networking process data.
The only closed-firewall solution for networking process data.
Using no VPNs means no extension of the plant’s security network. DHTP can work seamlessly within network proxies, data proxies and DMZ servers.
Read-only options and non-intrusive connectivity ensure that the plant remains secure and functional, even if remote data access is degraded or a remote location is compromised.
The plant decides which data to make available remotely.
Real-time data is delivered at microseconds above network latency, easily scaling to 50,000+ data point changes per second, all the while preserving the data model across networks.
Each connection can be configured as read-only or read-write, to support data monitoring or supervisory control.
By reducing these security hurdles, Skkynet reduces security costs.
* Arrows illustrate initial connection path; all connections enable bi-directional data
Works seamlessly within network proxies, data proxies and DMZ servers. MQTT provides outbound connection from DMZ to the cloud.
Supports supervisory control data from the cloud back to the plant, for any cloud service that allows it.
Pre-configured support for Azure IoT Hub, Google IoT, and Amazon IoT Core. Also connects to any MQTT broker, like RabbitMQ or Mosquitto.
Full integration with Skkynet’s SkkyHub cloud service. Make plant-to-cloud and cloud-to-cloud connections.
* Arrows illustrate initial connection path; all connections enable bi-directional data
Get the performance of a DMZ in the cloud by using SkkyHub, our secure cloud service that only accepts connections from the DataHub or ETK.
No longer just a data collector, the cloud becomes a dynamic service for sharing data between remote devices or facilities.
With the ETK, data on embedded devices can be sent to the DataHub or SkkyHub via DHTP, using no VPNs and keeping all firewall ports closed.
All remote connections are outbound, so no inbound firewall ports are opened. Zero attack surface means zero attacks.