Security

Information systems need to be secure if they are to be reliable. Utilities are critically reliant on their information systems for key business processes (e.g. scheduling, transaction processing). As a result, security can be seen to be a very important area for management to get right.

Data in any information system is at risk from:

  • Human and technical errors
  • Commercial espionage (e.g. competitors deliberately gaining access to commercially-sensitive data)
  • Malicious damage (an employee or other person deliberately sets out to destroy or damage data and systems)
  • Accidents and disasters

Ergobyte implements reliable policies and technical measures in order to prevent unauthorized access, alteration, theft, or physical damage to Helios4:

HTTPS point-to-point encryption

HTTPS secures data as it travels between the server and the client. It encrypts and decrypts user page requests as well as the pages that are returned by the Web server. Security of data throughout the collection and processing cycles ensure that customer data and utility operations remain confidential.

Secure login

Secure Login module locks down not just the user/login page but also any page containing the user login block. As a result, it eliminates password reset calls, protects against unauthorized access to the applications and integrates with almost any authentication device.

Audit log

It is a record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Helios4 keeps records of every operation done by users, enabling administrators to monitor the use of the system.