SYSTEM POINT continuously monitors the connectivity status of all managed devices, as well as the configuration versions (hardware, firmware, software
and configuration) and asset nameplate information for IEC 61850 devices. This enables end-users to effortlessly track the configuration status of their systems, a
fundamental cybersecurity requirement.
Any security event including software failures and user actions within SYSTEM POINT or at any of the managed devices can be tracked through IEC 61850 or Syslog. This provides a security auditing platform that integrates all devices of each station (IEDs, networking equipment, servers, workstations, etc.).
Both legacy and modern devices generate standards-compliant or vendor-specific system log files that can also be captured and stored by SYSTEM POINT.
SYSTEM POINT user account and information database is maintained seamlessly across the server hierarchy and follows modern RBAC principles. User management can be integrated with external LDAP or Active Directory (AD) servers and enables users to deploy systems with simplified user account, authorization, credential revocation, and access control based on utility policies.