Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Integration Studio

AVEVA security responsibilities

  • Last UpdatedDec 05, 2025
  • 2 minute read

AVEVA is dedicated to ensuring that its software applications and their underlying platform are secure by design. AVEVA helps maintain the security of the cloud. AVEVA's responsibilities include:

  • Infrastructure and Data Center Security

    AVEVA manages the network infrastructure and baseline system. These elements follow industry-leading standards and undergo rigorous audits and regular assessments.

  • Development best practices

    AVEVA development teams adhere to a secure software development lifecycle policy that incorporates redesign, rigorous testing, and prompt patch management. AVEVA distributes critical security patches and updates through maintained image updates.

  • Application updates

    AVEVA ensures that the latest official versions of Pro/II Simulation, AVEVA Dynamic Simulation and AVEVA Process Simulation are installed. This takes advantage of the most recent enhancements as well as critical security improvements.

  • Baseline Platform Configuration and Monitoring

    This platform incorporates several protocols designed to safeguard the environment, including:

    • continuous monitoring

    • threat detection

    • alert mechanisms

  • Encryption and secure storage

    Built-in encryption and secure data handling protocols are standard for components that AVEVA manages.

  • Windows updates

    The AVEVA Integration Studio team regularly installs the latest Windows security updates and patches into the base images, which ensures that they remain secure and robust.

  • Endpoint protection

    AVEVA routinely scans all endpoints associated with AVEVA Integration Studio. AVEVA updates and deploys Windows Defender for AVEVA Integration Studio sessions to safeguard against potential vulnerabilities.

  • Operating system hardening

    Hardening measures include limiting privileges for non-administrative users and disabling unnecessary services to reduce the attack surface and to secure the underlying operating system.

  • Disk encryption

    All customer files and data reside in encrypted cloud storage. This ensures that your information is safeguarded while at rest and during transit.

TitleResults for “How to create a CRG?”Also Available in