Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Integrator for Business Analytics

Application security

  • Last UpdatedJun 25, 2025
  • 1 minute read

Defensive Measures around Denial of Service (DoS)

To maximize security of the PI Integrator for Business Analytics, we recommend installing the PI Integrator within an intranet architecture, so that it is protected by your network's security.

In cases where it is necessary to write to internet-based targets, such as a cloud platform, the PI Integrator should be configured to publish to these targets through an HTTP proxy. For more information, see How to connect to PI Integrator to publish targets through an HTTP proxy.

Related Links
TitleResults for “How to create a CRG?”Also Available in