Capture BACnet traffic right from your JACE

JACE Niagara 4 webinar Visual BACnet feature

Share This Webinar


The latest release from Visual BACnet brings huge convenience and time-saving for users with JACE controllers. Now, you can capture BACnet data quickly and easily, sending it right from your JACE to Visual BACnet for analysis. There’s no additional hardware required, and no need to send staff on-site.

The solution means that anyone with a JACE controller can capture the BACnet traffic they need with ease. All you need is a JACE running Niagara 4; Wireshark, or the Visual BACnet Capture Tool for Windows or Linux, and a Visual BACnet account.

This technology allows you to capture BACnet data 100% remotely. If you capture using the Visual BACnet Capture Tool for Windows or Linux, your file will upload directly to Visual BACnet for analysis and diagnosis. You can even schedule or trigger captures remotely using the Windows or Linux Capture Tool, streaming from your JACE to Visual BACnet whenever you need.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

An overhead photograph of a solar farm in an urban setting, possibly a parking lot.

How OT Networks Drive Decarbonization and Energy Efficiency

Energy efficiency is at the heart of many organizations’ policies to address their overall carbon footprints. For facilities operators, campus managers, and their vendors, the drive to decarbonize falls under their purview. Let’s look at what exactly decarbonization is, what impacts this policy has on OT networks, and some of the ways facilities and systems integrators have begun to tackle the problem.

A photograph of a blue pad lock on top of an open laptop

Is BACnet/SC the Key to Securing OT Networks?

The success of BACnet/SC will depend on how widely it is adopted and how well it integrates with other security technologies. That said, with the right implementation strategies, and a focus on maintaining flexibility and interoperability, BACnet/SC has the potential to play a central role in securing OT networks against future threats.