Back to Results
First PageMeta Content
Hardware virtualization / Hypervisor / TenAsys / Virtualization / Virtual security appliance / Hyper-V / Comparison of platform virtual machines / Embedded hypervisor / System software / Software / Virtual machines


Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured® PC-based Control and Operation Industrial controllers and HMIs today mostly lack protective functions for their IT and network security. U
Add to Reading List

Document Date: 2013-02-09 20:02:37


Open Document

File Size: 293,14 KB

Share Result on Facebook

Company

PHOENIX CONTACT / Page 4 About Innominate Security Technologies AG / TenAsys Corporation / Intel / Microsoft / Innominate Security Technologies AG / /

Facility

Visual Studio / /

IndustryTerm

cost-cutting technology / integrity monitoring services / networked industrial systems / remote services / virtual systems / device management software / potential other guest systems / add-on solution / native guest systems / industrial networks / virtual private network / machinery / components and solutions / joint solution / guest systems / real-time operating systems / real-time requirements / server systems / unmodified guest systems / software functions / dedicated security devices / /

MusicAlbum

I/O / /

OperatingSystem

DoS / Linux / Microsoft Windows / /

Position

appropriate embedded virtual machine manager / virtual machine manager / time-slice scheduler / embedded virtual machine manager / Controller / /

Technology

encryption / Ethernet / server farm / virtual machine / cost-cutting technology / firewall / Linux / VPN / technology of virtualization / operating system / Quality of Service / RTOS / operating systems / Gigabit Ethernet / /

URL

www.tenasys.com / www.innominate.com / /

SocialTag