How OptigoVN Helps Hardware Sales

Selling hardware to your customers is a net positive for everyone. So how do you encourage customers to break into their budgets for upgrades and replacements? Leveraging OptigoVN is a great way to bring data-based proof to your customers when it comes time to make recommendations.

How Penn State Solved MS/TP Issues Overnight

Penn State University Pattee Mall

When Tom Walker looked at Penn State University’s Navy Yard network, he saw big issues.  The system was busy and loud. So loud, that the overrun MS/TP network was bringing down the entire building.  Because this was happening on the MS/TP network, pinpointing the problem would mean boots on the ground to segment and test […]

What is KNX?

A string of blue lightbulbs on a white background.

BACnet gets compared to a lot of other protocols on the market, including LonWorks, Modbus, and KNX. We’re explaining how each of these protocols are different, and how they stack up against each other. In this article, learn about KNX.

The Argument for IT/OT Network Separation

Basics of OT networks cover

OT Networks Overview Operational Technology (OT) networks in smart buildings consist of elevators, lighting, HVAC, surveillance, or anything attached to the building. With these devices becoming more connected and networked, it’s possible to consolidate IT and OT networks. However, there are many benefits to IT/OT network separation. Separation helps optimize the IT and OT devices […]

How to Filter for BACnet Data in Wireshark

a computer screen displaying multicolored lines of code

In just five steps, you can export a packet capture (pcap) from Wireshark that only includes BACnet. From there, upload into OptigoVN and start digging into those packets! Check out the video below.

Securing the Internet of Things

A metal pole with several IoT devices, including weather measuring tools, outside.

Information Technology (IT) and Operational Technology (OT) are different in a lot of ways, from their design to their maintenance workflows and more. When IT and OT merge, these differences create new challenges for cybersecurity.