Phoenix Contact mGuard Secure Cloud

From |

What is Cloud Computing and why have people started to use it?

The usage of the internet has increased massively in last few years, which increases the cost of hardware and software. The new technology of Cloud Computing has been used to solve all these issues by providing online service, which reduces the cost of hardware and software effectively.

Cloud Computing is architecture or it can be defined as a type of internet service, which is designed to provide shared resources and computing services via the internet on demand over centralized server resources on a scalable platform. Cloud Computing allows customers to share resources like networks, storage, servers, services and applications without physical devices, on a pay-per-use basis.

There are three major cloud computing service categories:

Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
These are applications hosted by third party providers. Customers are able to use them over the internet.

Pay-as-you-use model.


Salesforce, NetSuite

Third-party application development platform and services built on its own infrastructure.

Again these tools are made available to customers over the internet.


Google App Engine, AWS Lambda

Third-party servers, storage, computing resources available for customers. Customers can use IaaS to build their own PaaS and SaaS service.


Google Cloud Compute, Amazon S3

Major security issues on implementing Cloud Computing Services

Cloud Computing is known as an emerging domain, the security of the data must be protected over the network. There are many issues in cloud computing but security is the major issue.

  • Misuse of Cloud Computing

Some criminals like Hackers and spammers can take advantage of the suitable registration, easy procedures and unspecified access to cloud services to launch malicious attacks like key cracking.

  • Insecure Application Programming Interfaces (API)

Customers handle and interact with cloud services by interfaces or API. Service providers must make sure that the security is integrated into their service models, while users must be aware of the security risks.

  • Wicked Insiders

Malicious insiders pose a greater threat in the Cloud Computing environment because consumers do not understand the providers’ policies and procedures. Malicious insiders may gain unauthorized access to the organization and its assets.

  • Shared Technology issues/multi-tenancy nature

This is based on a shared infrastructure and does not apply to multi-tenant architectures.

  • Data Crash

Compromised data may include deleted or changed data without backup, unrecorded with larger environments, lost encoded keys and illegal access to sensitive data.

  • Account, Service & Traffic hijacking

Account or service hijacking is usually done using stolen certificates. Such attacks include phishing, fraud, and exploitation of software vulnerabilities. Attackers can access key areas of Cloud Computing services such as confidentiality, integrity and service availability.

  • Unidentified Risk Report

Cloud services mean that organizations are less involved in software and hardware, so organizations should be aware that internal security, security compliance, auditing and logging issues may be overlooked.

Phoenix Contact mGuard Secure Cloud

A simple, secure, reliable solution to risks

mGuard VPN technology uses IPsec security protocols with strong encryption. This guarantees the confidentiality, authenticity and integrity of all information and data transmitted between the service personnel and the machine.

For any demo request or enquiry, feel free to contact me via the form below!

What product(s) would you like more information on? (required)


Please prove that you are not a bot

Smart Buildings for the Future

From |

Smart Buildings and smart cities are continuously transforming how people carry out their activities on a daily basis. Smart cities will soon emerge with things like street lights and parking meters connected to commercial buildings and connected to the internet. At present, some cities have started implementing the smart city approach by connecting everything about their community to the internet. Along with conserving energy, smart buildings will help save money. Here are some of the biggest IoT smart building trends likely to take shape this year.

Phoenix Contact designs robust and high-speed controls for the most demanding applications using the Niagara 4 Framework. The ILC 2050 BI goes far beyond building automation, providing industrially hardened control and modular I/O running the Niagara 4 Framework. Gain maximum flexibility from a large variety of I/O modules Connect up to 63 I/O modules on the local bus. Get support for DALI, MP-Bus, and M-Bus maximum 16 (RS‐232, RS‐485, M‐Bus, DALI) with special function modules.

You can use the ILC 2050 BI controller to automate different subsections in the building infrastructure, data centers and distributed properties. It has a variety of interfaces and supports a wide range of protocols. The integrated Niagara Framework enables you to have IoT-based automation due to standardization of various data types. This makes it easy to connect various sensors and actuators regardless of the manufacturer and communication protocol. The controller’s functions can be expanded with the Inline I/O Portfolio from Phoenix Contact.

The Inline I/O Concept

  • Digital input terminals
  • Relay terminals
  • Digital output terminals
  • TRIAC terminals
  • Analog input terminals
  • Analog output terminals
  • Functional terminals (DALI, 8 / S0, MBUS, UNI)
  • Power and segment clamps






IoT smart building trends in future


  • Predictive maintenance
  • Air quality measurement
  • IoT-supported complex applications
  • Measurement and verification using IoT
  • Real-time data accessibility
  • IoT in green building movement
  • IoT and prefabricated building components
  • IoT in efficient construction management
  • IoT for energy efficiency
  • IoT for better asset optimization

ILC 2050 BI Advantages: Summary

  • Unique: the only modular, industrial controller running Niagara.
  • Cost saving: no unused IOs, no gateways required, integrated switch. Simplified installation and reduced size.
  • Easy maintenance and quick setup.
  • High Quality: Robust, industrial design, made in Germany.
  • Part of the entire Phoenix Contact product portfolio!

If you would like to find out more about Phoenix Contact’s E-Mobility, feel free to contact me via the form below!

What product(s) would you like more information on? (required)

Please prove that you are not a bot

Termitrab Complete – The Narrowest Surge Protection

From |

The latest surge protection, Termitrab Complete (TTC) for MCR offers a peace of mind for users. With the TTC, you can reliably protect your signals against surge voltages from the field to the controller.

The TTC product range is a tailored product range for almost all applications in measurement and control technology. Depending on the type of signal to be protected, with TTC, you will find an ideally suited circuit version in the portfolio.

The areas of application for TTC are so diverse that they can be used in any industry. Thanks to the narrow overall width, starting at 3.5mm, the product range is ideal for process technology, as very often, a high density is required in the distribution cabinets. They protect up to 572 signals in one meter, which mean more products can be installed in the cabinets. The number of cabinets can be reduced so as to save cost. The various approvals permit use in onshore and offshore applications. The TTC portfolio offers the widest range of features and therefore an optimum selection of products for your applications.

The narrowest surge protection

Starting from an overall width of 3.5mm, Termitrab Complete is the world’s first surge protection solution for measurement and control technology.

Remote Signaling

You can decide if and when you require the remote signalling modules that are available. Up to 40 protective devices are visually monitored with the optional remote signalling modules.

To monitor retrospectively, you can easily align remote signalling modules to protective devices that are already installed.

If a protective element is disconnected in the event of surge voltages, the disconnected device closes the monitoring channel and group remote signalling is triggered. The overloaded device is displayed on site by the status indicator (in the picture highlighted in red). This is purely mechanical, without consuming energy from the signal lines.


For repeated tests, remove the surge element connector from the base of the multi-piece protective device without impedance. The signals are not interrupted and the controllers do not immediately detect an impedance change in the measuring circuit.

Testing and documentation takes place in the CHECKMASTER 2. If a replacement is required, the affected surge element connector can be replaced without accessing the installation.

Innovative knife disconnection

The integrated two knife disconnection enables the signal path to be broken so as to carry out isolation measurements. An open signal path is easy to detect from the projecting function screws. The screws are equipped with overwind protection.


Certain applications require special tests and approvals. TTC meets the requirements of Underwriters Laboratories (UL), Furthermore, versions with ATEX, IEC Ex and GL approvals are available as well.

If you would like more information about Termitrab Complete, feel free to contact me via the form below!

What product(s) would you like more information on? (required)

Please prove that you are not a bot

Planning for Lightning and Surge Protection?

From |

Choosing the right Lightning and Surge Protection is a lifelong investment, just like purchasing a good comprehensive life insurance policy. Without proper planning and consideration, your business, your home maybe inadequately protected and most importantly your people/investments will be at risk.

In this article we shall dive in on the risk assessment, lightning and surge protection zoning and protective devices type.

A point to note: As you may know, Surge Arresters are vital when you are planning for a lightning and surge protection system. For information on when Lightning and Surge Protection is necessary, visit our previous article here.

Three points to consider when planning for Lightning and Surge Protection: 

  1. Risk analysis with accordance with IEC 62305

The answer to the common question: “Do I need to install lightning and surge protection devices?” boils down to the result of a careful and systematic risk assessment, which is carried out after inspection of the physical structure and electrical installation.

It would start with addressing the risk of various sources of damages (e.g. a direct lightning strike in the building, transient overvoltages that are coupled into the electrical installation caused by atmospheric influences) which come into focus, as do the types of damage resulting from these incidents:

  • Impact on health or loss of life
  • Loss of technical services for the public
  • Loss of irreplaceable objects of cultural significance
  • Financial losses

The financial benefits are determined as follows:

  • How does the total annual cost for a lightning protection system compare to the costs of potential damage without a protection system?
  • The cost evaluation is based on the expenditures for the planning, assembly, and maintenance of the lightning protection system.

If the risk assessment determines that lightning and surge protection is required, then the type and scope of the specific measures for protection to be considered will include:

  • External lightning and surge protection
  • Internal lightning and surge protection
  • Grounding and equipotential bonding
  • Coordinated Lightning and Surge Protection Devices system
  1. Characterizing the lightning protection zones (LPZ)

In order to ensure the total protection of a physical structure from the effects of lightning strikes and surge voltages, various protective measures or equipment that are tailored to one another are required.

The installation locations of surge protective devices within a physical structure are determined using the lightning protection zone from part 4 of lightning protection standard IEC 62305.

It divides a physical structure into lightning protection zones (LPZ), and does so from outside to inside with decreasing lightning protection levels. In external zones only resistant equipment can be used. However, in internal zones, sensitive equipment can also be used. The individual zones are characterized and named as follows:

  • LPZ 0A: Unprotected zone outside of a building where direct lightning strikes are possible. The direct coupling of lightning currents in cables and the undamped magnetic field of the lightning strike can lead to danger and damage.
  • LPZ 0B: Zone outside the building that is protected from direct lightning strikes, for example, by an air terminal. The undamped magnetic field of the lightning strike and induced surge currents can cause hazards and damage.
  • LPZ 1: Zone inside the building where high energy surge voltages or surge currents and strong electromagnetic fields are still to be expected.
  • LPZ 2: Zone inside a building where surge voltages or surge currents and electromagnetic fields that have already been significantly weakened are to be expected.
  • LPZ 3: Zone inside the building where surge voltages or surge currents are expected to be only extremely low or entirely absent and electromagnetic fields are expected to be only very weak or non-existent.

Lightning protection zone concept with coordinated SPDs at the respective zone transition points

  1. Lightning and Surge Protection Device types

The lightning protection zone concept provides coordinated surge protective devices for all cables that cross between zones. Their power values are based on the protection class to be achieved. As such, different SPDs are required based on the zone transition points.


The requirements for the individual SPD types are defined in the standard IEC 61643- 11 [6] for surge protective devices used in low-voltage systems. A multi-level protection concept is derived from this:

Risk assessment, in general, is a complicated and demanding process. An advisable starting point is to list out the areas that are most at risk and filter to the ones that are not.

Once you’ve listed out the potential risk areas, you can then consider the types of SPD best suited to the kind of application/equipment you’re protecting.

Food for Thought: Lightning strikes 90% of the earth. Some parts are highly prone to lightning strikes while some aren’t.

Since Southeast Asia sits comfortably near the equator, the hot and humid weather makes conditions favourable for the development of lightning producing thunderstorms. Thus, it is important to make sure you are well-protected.

Lightning strike densities across the world

Lightning strike densities across the world

Other tips for Risk Assessment

Be sure to refer to risk assessment standards IEC 62305-2. Some countries make it compulsory to use the standard when considering surge protection for large scale or highly sensitive buildings such as industrial facilities, hospitals, and data centres.

More information on Phoenix Contact’s Lightning and Surge Protection Devices can be found here.



  1. International Electrotechnical Commission. IEC 62305-1 – Lightning protection – Part 1: General principles. s.l. : VDE Verlag GmbH, 2010.
  2. International Electrotechnical Commission. IEC 62305-2 – Lightning protection – Part 2: Risk management. s.l. : VDE Verlag GmbH, 2010.
  3. International Electrotechnical Commission. IEC 62305-3 – Lightning protection – Part 3: Physical damage to structures and life hazard. s.l. : VDE Verlag GmbH, 2010.
  4. International Electrotechnical Commission. IEC 62305-4 – Lightning protection – Part 4: Protection against lightning. Electrical and electronic systems within structures. s.l.: VDE Verlag GmbH, 2010.
  5. International Electrotechnical Commission. IEC 61643-11 – Surge protective devices connected to low-voltage power systems – Requirements and test methods. s.l. : VDE Verlag GmbH, 2011.

Harsh Environment PCB Enclosure

From |

Selecting an enclosure is simplified by reviewing the sizes of the components & the PCB board that is to be enclosed, followed by the aesthetic look. However, when choosing an enclosure suitable for a harsh environment, the requirements become complex. Several things need to considered, such as how the enclosure is going to be mounted, whether the enclosure needs a vent, what is the degree of protection, what kind of test needs to be performed and many more.

Making a wrong choice can be extremely destructive, brand damaging and it also signals the end of the product.

What we can offer

Phoenix Contact presents new housings for electronics, for especially harsh ambient conditions. The robust housings of the Environment Case System (ECS) series with IP69 degree of protection are suited for a broad temperature range of -40°C to +100°C, and reliably protect the integrated electronics from physical influences.

  • Ideal solution for applications both indoors and outdoors
  • Protection class IP66/69
  • Protection against dust, water and UV-radiation
Main features Customer benefits
Vented or Unvented Enclosures Using the vented version allows pressure to escape to reduce the stress on the seal and also allows any condensation built up to escape, protecting the valued electronics inside the enclosure.
Tamper Protection Allows manufacturers or installers to add tamper evidence security in the latch areas to tell if anyone has opened the product in the end application.
Accepts 1.57mm and 2.36 mm thick PCBs


Customers are able to choose which thickness they want to use for their PCB design.
Pole Mounting (Accessory) Using our pole mount accessories the customer can easily mount their device on a pole (mast) or frame.
PCB Lock Integrating this accessory allows technicians to only pull the PCB out of the enclosure to a set length. It can also prevent the PCB and faceplate from falling out of the enclosure when unlatching.

Heavycon Evo

From |


I believe that many of us have experienced similar problems with plugs and sockets as pictured above, especially while travelling. Due to poor designs, some of our bulky charging equipment for our phones, laptops or cameras may not be able to charge. This creates massive inconvenience for us as we are unable to use our devices when we need them. In times like these, being able to adjust the wall plug orientation would solve the problem.

Surprisingly, such problems also arise in factories and warehouses that usually utilise heavy machinery. However, having such problems with heavy machinery will bring about more inconvenient repercussions such as having to move your machine to another location or adjusting your wall plug so that the socket can be plugged into it. These will bring about higher costs and also more tedious work.

The Phoenix Contact team has thus come up with a solution to overcome these problems.

Our Heavycon Evo is a heavy duty connector which allows the cable gland to be connected vertically or horizontally depending on the site conditions and requirements. The housing offers range from B6 to B24 and cable gland sizes of M20, M25, M32 and M40. Because of how customisable the product is, using it reduces the inventory in stock. Heavycon Evo is particularly useful when it comes to installation of cables in rather tight spaces. This also helps create a more compact setup which saves space. In cases where the wiring and connection points between cables are in obscure and inconvenient positions, the Heavycon Evo allows the user to alter the orientation of the sleeves from horizontal to vertical or vice versa. This feature also allows the wiring to last longer as the wires will not be in positions where they are under high tension.

Besides fulfilling its original purpose, the Heavycon Evo has additional benefits. When told that the Heavycon Evo is made up of plastic, many have the impression that it is not very durable. However, the fact that the Heavycon Evo is made of plastic brings about many benefits. The Heavycon Evo is made of high grade polyamide plastic that has gone through stringent quality checks such as IP and Nema degrees of protection, vibration, temperature shock, shock resistance, roll-over test and the dynamic load special test which verifies that the Heavycon Evo bayonet locking and double latch do not open independently or malfunction even in the case of extremely high static loads. Furthermore, the high grade plastic of Heavycon Evo will drastically lessen the load of machinery as it is significantly lighter than its metal counterpart by up to 50%.

Heavycon Evo enables the multiple connections of data, power and signal in a single housing with up to six difference combinations. We have also implemented our state of the art push-in technology in our inserts to allow easy, fast and secure connections in every application. Lastly, there is a common misunderstanding that plastic sleeves cannot match the applications of metal sleeves. However, this is not true as our Heavycon Evo is compatible with all existing setups of up to 24 positions with existing metal setups.

In conclusion, Heavycon Evo is compact to be installed in tight positions, cost effective, light weight and compatible. Hence, it will be your number one choice when buying heavy duty connectors.

Interested to find out more? Feel free to contact us via the form below!

What product(s) would you like more information on? (required)


Please prove that you are not a bot

Do you like to be Monitored?

From |

In today’s world, people appreciate monitoring because we would be happy to observe and check on the progress of something over a period of time. For example, we install CCTV at home to check on our family’s safety; we keep our phone GPS turned on to keep our loved ones informed of where we are; we join different social media platforms and post crazily to keep ourselves “alive” and keep others “alerted of our presence”.

In the industrial world, condition monitoring is also a trendy topic. It is the process of monitoring a parameter of conditions in machinery (vibration, temperature etc.), in order to identify a significant change which is indicative of a developing fault. The ultimate objective of condition monitoring is to achieve predictive maintenance to avoid a burst of the operating cost and to increase productivity and efficiency.

Phoenix Contact is embarking on Industry 4.0 in order to provide the solutions that focus on the value and ease of preventive and predictive maintenance. Below are a few monitoring solutions for different industries for your kind consideration.

Pump and Motor Monitoring System for Water Industry (PumpMonitor)

To minimize maintenance and repair costs, reduce energy consumption and increase system availability.

  • It is an installation-ready control cabinet solution
  • Bearing and machine vibrations are recorded by the integrated sensor module
  • Standard communications (PROFINET, OPC etc.)
  • Online status monitoring with colour visualization
  • Option to integrate into the Cloud

PV Monitoring System for Solar Industry (SOLARCHECK)

To maximize the energy yield and help to reduce operation and maintenance cost.

  • It measures the current using Hall sensors
  • The conductor feeds through the openings in the measuring module and connects to the communication cable
  • Contact-free measurement with safe isolation and no contact resistance
  • Option to extend the system with a voltage measurement of up to 1500 V DC

Remote Control and Monitoring System for Railway Industry

To save labour and maintenance cost through remote access and to improve system reliability.

  • Able to control many interlinked components of various systems
  • Easy to integrate the controller into existing networks
  • License-free wireless technology for I/O signals and serial data transmission
  • High availability with redundant power supplies
  • SPD protects the system against switching surges and lightning strikes

Lightning Monitoring System for Lightning Prone Zone Infrastructure (LM-S)

To be informed online of the lightning strikes to determine whether any checks or maintenance are required.

  • The sensors can record the magnetic field (based on the principle of the Faraday effect) due to the lightning surge current
  • The typical parameters recorded are maximum lightning current strength, lightning current rise time, charge and energy
  • It can be integrated in standard network systems via the RJ45 Ethernet interface
  • Internal web server is used to access data and configure the system

Your system will be safeguarded by Phoenix Contact because we can help you to put it under close monitoring before the developing of faults (predictive maintenance) or immediately right after the faults occur (preventive maintenance). If you are interested to find out how our monitoring system can contribute to your operating expenses (OPEX), feel free to contact me via the form below!

What product(s)/event(s) would you like more information on? (required)

QUINT4 Power SupplyQUINT ORINGQUINT DIODEPT-IQ SPDTTC SPDHEAVYCON HPRHEAVYCON Modular InsertsM12 Network ConnectorsPush-in Terminal Blocks and MarkingsCable Management ProductsIRSE ASPECT Conference 2017Monitoring SystemsEMProPower Meter

Please prove that you are not a bot

IP Ratings

From |

I accidently dropped my phone into the water during my last swimming session. Luckily, my phone is waterproof and I studied the specifications. It is a smartphone with an IP67 rating. So what does IP67 mean? What do the two digits represent?

IP rating is known as Ingress Protection or International Protection ratings, which are defined to the international standard of IEC/EN 60529. IP ratings are used to define the levels of sealing effectiveness of the product against intrusion of dirt and water. The first digit indicates the level of protection against solid particles while the second digit represents protection against ingress of liquids.

First Digit

Level Protection against Description
0 No protection against contact and ingress of objects
1 >50 mm Any large surface of the body, such as the back of a hand, but no protection against deliberate contact with a body part
2 >12.5 mm Fingers or similar objects
3 >2.5 mm Tools, thick wires, etc.
4 >1 mm Most wires, slender screws, large ants etc.
5 Dust protected Ingress of dust is not entirely prevented, but it must not enter in sufficient quantity to interfere with the satisfactory operation of the equipment.
6 Dust tight No ingress of dust; complete protection against contact

Second Digit

Level  Protection against Description
0 No protection against water
1 Dripping water Dripping water (vertically falling drops) shall have no harmful effect.
2 Dripping water when tilted up to 15° Vertically dripping water shall have no harmful effect when the enclosure is tilted at an angle up to 15° from its normal position.
3 Spraying water Water falling as a spray at any angle up to 60° from the vertical shall have no harmful effect.
4 Splashing water Water splashing against the enclosure from any direction shall have no harmful effect.
5 Water jets Water projected by a nozzle (6.3mm) against enclosure from any direction shall have no harmful effects.
6 Powerful water jets Water projected in powerful jets (12.5mm nozzle) against the enclosure from any direction shall have no harmful effects.
7 Immersion up to 1m Ingress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time (up to 1 m of submersion).
8 Immersion beyond 1m The equipment is suitable for continuous immersion in water under conditions which shall be specified by the manufacturer. Normally, this will mean that the equipment is hermetically sealed. However, with certain types of equipment, it can mean that water can enter but only in such a manner that it produces no harmful effects.

With the information from both tables, we can now interpret the ingress protection of equipment. For example, a product with an IP66 rating means that the product is dust tight and protected against powerful high-pressure water jets from all directions.

IP rating is a critical parameter for industrial equipment that is intended to operate in dusty environments and are exposed to the risk of water ingression (outdoor application, offshore application, etc). In Phoenix Contact, we have several products that designed to fit into such extreme environments.

  • CLIPSAFE Enclosure

Phoenix Contact CLIPSAFE enclosure product range is IP66 rated, providing comprehensive protection for your application in harsh industrial environments. Thanks to the high quality sealing design, CLIPSAFE enclosure protects your equipment from the risk of dust and water ingression.

IPX6 All Directions Water Jets Test

IPX6 Water Jets Test

IP6X Dust Test

  • HEAVYCON Industrial Connector

With the combination of the robust IP66, IP67 and even IP69K (highest rating till date) rated HEAVYCON industrial connectors, we have a reliable housing that can connect the equipment within CLIPSAFE enclosures to external devices.

  • WLAN Module

Not a fan of wired communication?

Phoenix Contact offers wireless communication modules, which features protection up to an IP68 rating. It can be directly mounted on enclosures (CLIPSAFE for instance), providing a complete industrial solution with high IP protection.


From |

Better Sealing, better availability

In most cases, whatever we install inside a control cabinet, we are confident of its protection against external factors. This could be true if certain levels of sealing effectiveness were defined.

An example: Data SPD was installed inside the control cabinet, the gap between the housing and the RJ45 port is an easy entry point of foreign material or even an Insect. Thus, leading the SPD to immediate failure.

In comparison,


Your advantages

  • Reliable transmission speeds of up to 10 Gbps
  • Protective adapter for eight signal paths via RJ45 connector
  • Suitable for category 6 high-speed data networks
  • Can be installed in a control cabinet.

Better sealing, no GAPS between housing and RJ45 port.

Wireless Technology: the Industry 4.0 Backbone

From |

Industry 4.0 is the 4th generation industrial revolution. This world-changing principle enhances productive efficiency in smarter and faster ways by utilizing the state of the art technology of data analysis software alongside powerful computerized hardware capabilities.

The key to the success of Industry 4.0 is to connect thousands of devices to the central system in order to allow exchanging of various parameters to the processing unit, such as humidity, temperature, status, level, etc. Not only is data transmitted, but devices also receive commands for further actions.

Actually, the powerful hardware and advanced software capabilities have existed for over 20 years. However, the increased number of devices connected to the system means a higher cost of investment. In the past, the only reliable connectivity was through wired cables, which investment cost was directly related to the complexity of the number of devices.

This key obstacle has been rapidly resolved by the advent of reliable wireless technology. Today, various applications of wireless technology have been proven and widely used, such as:

NFC: Near Field Communication

RFID: Radio-Frequency Identification

Wi-Fi: Wireless Fidelity

What makes people trust wireless technology?

Security: New advancements in data encryption technology protects data from intruders.

Speed: The new standard of network 802.11ac helps increase data transmission speed to 10 times faster than the old standard which is sufficient for industrial control systems.

Savings: All stakeholders follow the wireless markets trend. Therefore, new hardware for wireless technology has been introduced daily. This brings significant reduction in the price of wireless devices which mean tremendous savings during investments.

Phoenix Contact offers a huge portfolio of products under the category of wireless technology, as shown below.