Secured Functionality
Multi-level Function Monitoring
All system processes and components are monitored in real-time. In case of malfunctions, partial areas or the entire system can be excluded from the system network without negatively affecting the other functionalities of the installation. The malfunctioning sub-components are reported accordingly, allowing for immediate repair and restoration of overall functionality.
Secure System Architecture
All system data, including operating system, configurations, and applications, are stored in encrypted form. Access to the accessible system areas is exclusively via protected service interfaces (HTTPS, SSH).
Simple Updates During Operation
System and software updates can be installed encrypted and without physical access via the network. Activation occurs through a targeted restart. This keeps the system up-to-date at all times and ensures efficient and fail-safe operation.