Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for CygNet

Security best practices for PI Connector for CygNet

Security best practices for PI Connector for CygNet

  • Last UpdatedNov 19, 2024
  • 1 minute read

Connectors collect data from many sources. The protocols used by these data sources require special consideration when determining the security that you will use.

PI Connector for CygNet uses the CygNet Scripting API and the CygNet ODBC driver to communicate with a CygNet system.

Optionally, the connector can be run on a system separate from the CygNet data source, meaning any unencrypted communications between the connector system and remote CygNet system are exposed on the network between the two systems. We recommend running PI Connector for CygNet using one of the following options:

  • On the same host as the CygNet system

  • Within a secure internal network

  • Using an encrypted connection, such as a Virtual Private Network (VPN)

Related Links
TitleResults for “How to create a CRG?”Also Available in