Cybersecurity
At MVTec, we prioritize product quality and customer benefit. Our software is developed by highly skilled engineers at our headquarters in Munich, following industry best practices and stringent guidelines.
We are committed to ensuring that our software:
- Retains recognized industry standards and regulatory requirements.
- Is designed and tested to be free from known vulnerabilities and backdoors.
- Is continuously monitored and updated to address emerging security threats.
- Provides all necessary documentation for full transparency on third-party components and dependencies.
You can find relevant changes in the release notes.
Secure Configuration
MERLIC provides communication devices, which can be used to configure or control components of MERLIC. Except communication via OPC UA, there is no encryption. This should be taken into account when using remote access or when giving access. MERLIC is expected to be used in a safe environment. This can be encountered by restrictive firewall rules or the usage of a reverse proxy. Part of this safe environment is also a restrictive read and write access to the file system for operating system users, which needs to be encountered on file system and operating system level.
Security Contact
If you have any security-related questions or concerns, please contact us at security@mvtec.com. Your request will be processed with care and discretion.
For more information and further contact options, please refer to the MVTec homepage at www.mvtec.com/cybersecurity.