Skip to content

Security best practices for customers

Cybersecurity continues to evolve, and our approach to octoplant evolves alongside it.
The following sections present our security best practices and recommendations. Depending on the octoplant version you are using, some items may not apply to your setup or may require a different approach.

Info

We strongly encourage you to review and follow these recommendations.

Network security foundations

To ensure the secure use of octoplant, we recommend following current IT security concepts. While customers are responsible for implementing these measures, we offer foundational guidance to help you establish a baseline security posture that meets the minimum requirements for deploying octoplant.

Key recommendations include:

  • Network placement: Host the octoplant server within a securely protected network environment. Use state-of-the-art firewalls and intrusion detection/prevention systems (IDS/IPS).
  • Firewall configuration: Configure firewall rules as restrictively as possible. We provide a detailed list of required ports to support precise configuration and reduce exposure.
  • Malware protection: With cyber threats constantly evolving, use anti-malware solutions as a standard safeguard. Install protection on the octoplant server and configure appropriate exception rules for the VDog MasterService to ensure uninterrupted operation.
  • Security assessments: Conduct regular security assessments and define IT security policies tailored to your environment and compliance needs.

Info

If you have any detailed questions, we are happy to assist you.
Send a non-binding inquiry to our Customer Services Team.