Connector security
- Last UpdatedMar 21, 2025
- 1 minute read
- PI System
- PI System Connector 2.5.4
- Connectors
The following topics describe security procedures to ensure the integrity of your data; however, some data source protocols are inherently insecure. AVEVA recommends you review the security standards for your data source to determine the appropriate security measures necessary to secure your system.