How to Demonstrate OT Network Health With OptigoVN Reports

Why Reports Matter Whether you’re performing proactive maintenance routines, responding to a service call, or commissioning new devices, you need clear proof that your work improved network performance. Optigo Visual […]
Your BACnet Questions Answered: Episode 3

Mastering MS/TP. Sounds like an archaic thing to do 2025, but MS/TP BACnet systems are still a lot more common that you’d think, and it’s become increasingly harder to ensure […]
When Bad Data Breaks Buildings: Lessons From The Field

Modern buildings rely on thousands of data points to keep people comfortable, safe, and productive. From temperature readings and air quality sensors to elevator positions and occupancy lighting, these systems […]
Your BACnet Questions Answered: Episode 2 (Part 2!)

Welcome to our bonus mini episode with a few more “advanced” BBMD topics we tackled! The response to our Q&A series has been incredible – thank you to everyone who […]
Why OT Network Projects Fail — and How to Prevent It

Collaboration has its upsides. We’ve looked at the benefits of collaboration across teams (IT partners, systems integrators, vendors, etc.) when it comes to training and how it makes a critical […]
Your BACnet Questions Answered: Episode 2 (Part 1!)

You asked, we answered. This time, it’s all about BBMDs. We’re back with another episode of answering your BACnet questions! The response to our Q&A series has been incredible – […]
How OptigoVN Complements Your Tech Stack

When you’re managing an operational technology (OT) network, the last thing you want is another tool that disrupts your systems, duplicates your efforts, or forces a complete overhaul. That’s where […]
Your BACnet Questions Answered: Episode 1
You asked, we answered. Welcome to the first episode of our Q&A video series with Ping! We’re thrilled with the response to our call for BACnet and OT network questions! Our […]
Zero Trust Security in OT Networks: A New Era of Protection

The Changing Landscape of OT Cybersecurity For decades, cybersecurity strategies operated under a simple assumption: anything inside the network perimeter could be trusted (aka the Castle and Moat theory). For […]
Hidden Problems: Is Your Network on the Verge of Catastrophe?

For years, it was easy to operate building automation (and most building systems) under the assumption that “if nothing seems wrong, nothing is wrong.” However, this belief can be misleading […]