Our solid foundation for secure and trouble-free communication
All INSYS icom smart devices run on the hardened icom OS and INSYS OS operating systems and come installed and ready to perform.
The highly professional programming environment based on Linux containers (LXC) not only guarantees the basic functions and routing, it allows you to run various programmes and scripts virtually that are independent of the router itself. In spite of this only those Linux components required for a secure application are qualified and integrated.
The EBW, IMON, MoRoS and RSM router series use the INSYS OS operating system.
For high-performance gateway-capable routers such as the MRX, MRO, ECR or SCR series, icom OS is the standard.
icom OS is also hardware independent. This means that customers can use different devices within our Smart Devices according to their requirements without having to learn another operating system.
Compatible with the IT security requirements of ISO 27001, ISMS, BSI, EnWG §11 Para. 1a and BDWE-Whitepaper
Meets the requirements of critical infrastructure (KRITIS) applications in the energy industry, water supply and disposal and mechanical engineering
Impresses with outstanding user-friendliness and high efficiency in conjunction with applications such as device management (icom Router Management)
Creates the basis for a router to function as a multifunctional, sophisticated gateway in industrial networks
Routers with icom OS:
Routers with INSYS OS:
Switching from routers with INSYS OS to routers with icom OS brings you a considerable advantage in terms of functions:
For a simple switch from the INSYS OS operating system to icom OS, we have compiled the most important information in a compact white paper and will be happy to support you.
The MD5-Hash-Function for OpenVPN certificates will no longer be supported. Since icom OS version 3.7 the function is no longer available due to widely known security issues. Please read the corresponding Release Notes for detailed information.
The following application example will show you how a switchover works in practice and which advantages it offers.
Minimise your risk when it comes to IT security!
Learn more about preventive security concepts for the IIoT now.