
Maximum security
Maximum control of USB and Ethernet interfaces
Prevents unauthorised access and protects against cyber attacks
Manual activation, e.g. via key switch or RFID for authorised users

Simplicity
Easy integration into existing machines and IT security architectures

Compatibility
Compatible with NIS-2
Compatible with the Machinery Regulation 2027

Flexibility
Modular and flexible, adaptable to different application scenarios



