Sel 3622. Edmund O. Schweitzer III and SEL contribute to race to beat COVID19 The SEL-3622 has integrated exe-GUARD™ technology to provide strong anti-malware, password management, network communications security, and true multifactor authentication to a small number of relays/IEDs SEL-3622 Data Sheet Major Features and Benefits The SEL-3622 Security Gateway is a compact router, virtual private network (VPN) endpoint, and firewall device that can perform security proxy services for serial and Ethernet-based intelligent electronic devices (IEDs)
MHS commits to SEL from www.madisonmohawks.org
The SEL-3622 is a small form factor device that provides secure communications and physical protection for IEDs in distribution poles and substation yards The SEL-3622 also provides physical security controls, including an accelerometer, light sensor, and cabinet door sensor, that will alert.
MHS commits to SEL
The SEL-3622 has integrated exe-GUARD™ technology to provide strong anti-malware, password management, network communications security, and true multifactor authentication to a small number of relays/IEDs The SEL-3622 secures your control system communication with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness The SEL-3622 also provides physical security controls, including an accelerometer, light sensor, and cabinet door sensor, that will alert.
SEL3622 Radio Transceiver by SCHWEITZER ENGINEERING. The SEL-3622 also manages protected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules for stronger security. It supports IPsec VPN, MACsec, embedded antivirus, serial-to-Ethernet transceiver, and user-based access control.
How Many Traction Motors On A. Colin explains the benefits of the SEL-3620 Ethernet Security Gateway and SEL-3622 Security Gateway, laying the foundation for six tutorials to use these security tools. The SEL-3622 secures your control system communication with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness