Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

InTouch HMI

About Securing InTouch

  • Last UpdatedNov 07, 2016
  • 1 minute read

You can protect your InTouch applications using:

  • Traditional InTouch-based security

  • Operating system-based security

  • ArchestrA-based security

The following figure shows the relationship between the three types of security.

Graphics describing the relationship between the types of security

Related Links
TitleResults for “How to create a CRG?”Also Available in