Your BACnet/SC questions, answered.

Everything you need to know about BACnet Secure Connect

Everyone is growing more aware of the need for cybersecurity. There have been so many cyberattacks in recent years, it’s almost impossible to ignore. But there’s long been a view that cybersecurity is only an IT issue. Historically, building automation with BACnet has taken a different approach to cybersecurity, leading to confusion.

That’s changing in a big way with BACnet Secure Connect (BACnet/SC). This new technology will help keep your networks secure going forward, with new best practices that are IT-friendly and still backwards compatible with existing BACnet systems. But what does it all mean, and what do you need to know?

Join us to learn more about how BACnet Secure Connect will affect you, and what else you should know about keeping your systems secure. We’ll be talking with Bernhard Isler from Siemens and David Fisher from PolarSoft, two main figures behind BACnet/SC.

There are many protocols that make up the application layer of an IP network. Learn about some protocols you may have heard about, the roles they play on the application layer, and the importance of encryption.

Understand the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and how they facilitate the sending and receiving of messages over IP networks.

A Virtual Private Network could be described as a “secure, encrypted tunnel,” and it’s a big topic these days as more folks work from home. Find out what a VPN is, and how it works.

Gateways and firewalls are how we route packets through the network, and permit and block traffic based on certain rules. Learn how gateways and firewalls work to manage traffic connections in the network. 

What is an IP address? How does Dynamic Host Configuration Protocol (DHCP) work? And what’s the purpose of a static IP address? We’ll cover all of this as we venture into the world of the Internet.

Learn the differences between Virtual Local Access Networks (VLANs) and subnets, and their roles within a network.

Learn about different modes of network access, including Ethernet, Wi-Fi, hotspots, and clients. We’ll explore the pros and cons of each, and their different applications and uses.

Learn about the network layers and their roles. We’ll cover the differences between the OSI and TCP/IP Model, and how these layers form the basic network architecture.

Information Technology (IT) and Operational Technology (OT) are different in a lot of ways, from their design to their maintenance workflows and more.