Skip to content
StableNet APM Pie Chart

Customers frequently seek information and recommendations from Orolia about hardening security, including general guidelines about available network security features, jamming and spoofing deterrence, bug fixes, and networking-related issues.

Sometimes they’re in search of specific practices for time servers and clients. Sometimes, because SecureSync® is part of critical infrastructure, they may not fully understand all the issues related to timing, such as GNSS jamming/spoofing, NTP vulnerability or the various types of network attacks.

Generally speaking, the correct answers are specific to each networking infrastructure and each customer’s policies. However, there are some general guidelines to follow to harden security on your SecureSync®, and this document should help. It covers the following areas and explains how to use each to prevent cyberattacks:

  • Authentication and authorization
  • HTTPS and SSL
  • SSH
  • SCP
  • SFTP with public/private support

This document also consolidates the recommendations from various product manuals into one handy location. They identify each security feature, shows default settings and offers recommendations about whether you should choose to enable it.

To make it easier, we’ve also provided links to the online manuals for each protocol — so configuration help is just a click away.

Don’t hesitate to call upon us for help with your timing applications, and be sure to ask us about other ways to harden your timing chain with Resilient PNT (positioning, navigation and timing) solutions that provide signal protection in the event of an outage, interference/detection/mitigation, and GNSS simulation to identify issues before they affect your critical infrastructure.

Related Posts

Clock Features That Do More Than Tell Time

Clock Features That Do More Than Tell Time

When it comes to synchronized time systems, every environment has its own unique demands whether it’s harsh weather conditions, high-traffic…
A Modern Approach to NDR - How CySight is solving the problem of encrypted network traffic

A Modern Approach to NDR - How CySight is solving the problem of encrypted network traffic

Explore how advanced AI technology enables analysis of encrypted network traffic, providing enhanced security without decryption.
Everything IT professionals need to know about NTP and NTP Servers

Everything IT professionals need to know about NTP and NTP Servers

Explore the essential role of NTP in synchronizing time across networks, enhancing security, compliance, and operational efficiency.
Using Network TAPs to enhance network security in School Networks

Using Network TAPs to enhance network security in School Networks

Enhance school network security with Network TAPs for improved visibility, threat detection, and compliance with regulations
The Definitive Guide to Synchronized Clock Systems in 2025

The Definitive Guide to Synchronized Clock Systems in 2025

Accurate and synchronized timekeeping is more than just a convenience—it’s a critical component of operational efficiency, safety, and compliance. Whether…