Introduction; Scope; Assumptions And Pre-Requisites; Related Documents - Honeywell Touchpoint Pro Security Manual

Hide thumbs Also See for Touchpoint Pro:
Table of Contents

Advertisement

2 Introduction

This guide has been designed for use by operators and Information Technology (IT) personnel of customers who have a
Honeywell Touchpoint Pro (TPPR) system.
It is intended for use when planning the configuration and maintenance of the network infrastructure in which the TPPR
system exists.
It provides information supporting identification and mitigation of security risks associated with the day to day use of the
system in connected IT infrastructures

2.1 Scope

This document applies to Touchpoint Pro systems in a networked environment, associated computers, and data storage
media.

2.2 Assumptions and pre-requisites

This guide assumes a high degree of technical knowledge and familiarity with:
PC administration and operating systems
Networking systems and concepts
Security issues and concepts

2.3 Related documents

This guide should be read in conjunction with the following documents:
Document
Touchpoint Pro Technical Handbook
Webserver User Guide
PC Configuration Software Operating Manual

2.4 Security Controls

The Touchpoint Pro system has a number of built in security controls. These include:
Limitation of access to designated users
Password protection of user accounts
Secure (https) web server connection
Web server device certificate
Reduction of confidential data
2.4.1

Additional User Controls

This guide focuses on additional security controls that should be implemented by users.
2.4.2

Further Information

Contact your Honeywell representative if you need more information on securing your TPPR system.
Pt. No. 2400M2567_1
INTRODUCTION
Table 1.
Related Documents
5
Part Number
2400M2501
2400M2563
2400M2564
Touchpoint Pro
Security Guide

Advertisement

Table of Contents
loading

Table of Contents