Skip to content
Customers frequently seek information and recommendations from Safran about hardening security, including general guidelines about available network security features, jamming and spoofing deterrence, bug fixes, and networking-related issues.

Sometimes they’re in search of specific practices for time servers and clients. Sometimes, because SecureSync®/9483 is part of critical infrastructure, they may not fully understand all the issues related to timing, such as GNSS jamming/spoofing, NTP vulnerability or the various types of network attacks.

Generally speaking, the correct answers are specific to each networking infrastructure and each customer’s policies. However, there are some general guidelines to follow to harden security on your SecureSync®/9483, and this document should help. It covers the following areas and explains how to use each to prevent cyberattacks:

  • Authentication and authorization
  • HTTPS and SSL
  • SSH
  • SCP
  • SFTP with public/private support

This document also consolidate the recommendations from various product manuals into one handy location. They identify each security feature, shows default settings and offers recommendations about whether you should choose to enable it.

To make it easier, we’ve also provided links to the online manuals for each protocol — so configuration help is just a click away.

Supporting Material

TECH TIP: SECURESYNC 1200 SECURITY HARDENING RECOMMENDATIONS

Related Posts

Cubro Webinar Replay: Network Packet Broker Technologies Uncovered

Cubro Webinar Replay: Network Packet Broker Technologies Uncovered

In this webinar, Cubro takes a technology-first look at how modern network packet brokers are designed to support increasingly complex,…
What Is a Master Clock and Why Does It Matter?

What Is a Master Clock and Why Does It Matter?

Modern organizations rely on precise time synchronization to keep operations running smoothly and consistently. Critical systems across industries such as…
Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

In 2026, assuming your network is secure because you bought the “best” tools is no longer a viable strategy. The…
Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP Precision Time Protocol (PTP), standardized as IEEE 1588 in 2002, is a…
Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

It is the classic IT paradox: your application performed flawlessly in the staging lab, but the moment it was deployed…