Back to My Account
The main features of the software are:
No, it does not have. So far, both portals operate independently.
To successfully register your company on the WEG Transformer Fleet Management portal, make sure you have filled in all the data correctly. In particular, make sure you have filled in a valid Tax Number, otherwise the registration becomes unfeasible.
WEG Transformer Fleet Management (TFM) uses encryption mechanisms for data. During the transmission, communication between devices is encrypted using TLS, an industry-standard and widely used scheme.
Security is also applied to API access by standard JSON Web Tokens authentication. TFM does not store tokens after they are generated. It is up to the user to save this information securely. Devices that communicate via MQTT use application secrets and keys and are implemented in the same way as API Tokens, although they automatically access the specific application scope. Infrastructure security is done using Google Compute Engine's persistent disk functionality, which encrypts all data in transit and at rest. To protect plants, systems, machines and networks against cyber attacks, it is necessary to implement maintenance continuously and completely.
An event is characterized by the change of state of one of the parameters that Transformer Fleet Management monitors. The change of state indicates that one of the alarm criteria has been exceeded, either at the alert level or at the critical level.
Cookie Disclaimer
This site uses cookies in order to improve your online experience. Detailed information on the use of cookies on this website is provided in our Privacy Notice. By continuing to browse the site you are agreeing to our use of cookies.