Security in SEH Products

Minimize Attack Surface – Maximize Protection

A secure deployment of SEH device servers starts with three essential actions:
Secure the web interface, encrypt USB communication, and disable all unnecessary services.
These steps are fundamental to protecting your infrastructure—both in traditional enterprise networks and sensitive environments.

Further recommendations such as network segmentation, user authentication, or USB port control can enhance security even more.

A detailed overview of all recommended security settings is available in our Knowledge Base article:

Recommended Security Settings for SEH Deviceserver (PDF)

Where to Buy

SEH has a wide network of distributors and re-sellers worldwide. For a complete list of dealers and re-sellers, both European and worldwide, please visit our "Where to Buy" page. 
 

Contact Us