The Power of Precision
ZenoTOF 7600 system
SCIEX 7500 system
SCIEX Triple Quad 6500+ system
SCIEX 5500+ system
QTRAP 6500+ system
QTRAP 4500 system
View all mass
Intabio ZT system
Echo MS system
2.0 High Throughput Multiplexing system
View all integrated
BioPhase 8800 system
8000 Plus system
800 Plus system
Advance your research with front-end
instruments designed to help you realize the full power of your mass
spectrometer. SCIEX has the broadest portfolio of ESI-MS front-ends
can facilitate various flow rates, sample requirements and
sensitivities. No one else offers the entire range
flow, microflow, nanoflow LC-MS and even ultra-low flow
ExionLC 2.0 series
View all front-end HPLC MS
Differential mobility spectrometry (DMS) and
ion mobility spectrometry are analytical techniques used to separate
ions based on their gas phase mobility. Multiple types of ion
devices exist, such as drift tubes, traveling wave, and high-field
asymmetric waveform devices. Learn how you can separate yourself
Differential Ion Mobility.
The latest ion sources from SCIEX enable
enhanced sensitivity and robustness with greater desolvation range
across all MS platforms, from Triple Quad to QTRAP and QTOF.
Turbo V ion
OptiFlow Turbo V ion
View all ion sources
vMethod applications are pre-configured and verified LC-MS/MS
that reduce the need for method development – significantly cutting
time, effort and money to deploy a new assay. Every vMethod provides
method conditions, recommended sample prep, LC and MS conditions,
details for applicable MS/MS library databases for key applications.
and personal care products (PPCPs)
and protein bioanalysis
Explore vMethod applications
feature request portal
Biologics Explorer software
Molecule Profiler software
High resolution and QTRAP
libraries can dramatically enhance the quality of your analysis,
you much improved confidence in your data. With a comprehensive
at your fingertips, you can easily create methods and process
and non-targeted screening data on your complex samples, faster and
easier than ever before.
All in one
HR-MS/MS library with NIST 2017
Explore the library
Boost the performance of your mass
spectrometer and improve sensitivity, productivity, and data
iChemistry Solutions are the world's only reagents and
that are custom designed with your success in mind.
RNA 9000 Purity & Integrity kit
kit for amino acid analysis of hydrolysates
kit for amino acid analysis of physiological fluids
Protein CE-SDS Purity Analysis kit
MS calibration kits
CZE rapid charge variant analysis kit
BioPhase Fast Glycan Labeling and Analysis kit
View all consumables
QTOF – Quadrupole
Time of Flight
QTRAP® – Triple Quad Linear
SWATH® – Data Independent
SelexION® – Differential
MicroLC – Microflow
View All Technology
ADME and DMPK
Viral vector characterization
High-throughput mass spectrometry
Targeted protein degraders and PROTACs
Extractables and leachables
Residual nucleic acid analysis
Lipid nanoparticles and non-viral carrier
Messenger RNA analysis
Plasmid and DNA analysis
Synthetic oligonucleotide analysis
Cell line analysis
Charge heterogeneity analysis
Intact protein analysis
Peptide mapping analysis
Subunit mass analysis and middle-down
View all Biopharma and pharma
Clinical Mass Spec Operators
Clinical Method Developers
Clinical Lab Managers
View All Clinical
Pesticides & herbicides
Soil and biota
View All Environmental
How do you protect your reputation and meet today’s global food
standards? Whether you are a commercial lab or a food manufacturer,
quality of your food testing data is vital to your business. SCIEX
solutions help you meet maximum residue limits (MRLs) with
data that you can genuinely count upon. With a portfolio of
applications, your lab can quickly and easily react to diverse
Authenticity & Profiling Analysis
& Food Contact Substance Analysis
Food and Beverage Testing
How do you ensure the integrity of your
results in an industry that is never constant? By accurately
even the smallest compound angles you can deliver evidence that
SCIEX forensic analysis solutions deliver fast, highly accurate
data across a multitude of compounds and biomarkers, from the known
the new and novel.
Homeland security (coming soon!)
Cannabis and hemp potency testing
View All Forensic
Metabolic Flux Analysis
and SNP Analysis
View All Life
The SCIEX Now Learning Hub offers the most diverse and flexible learning options available, with best-inclass content that helps you to get the most out of your instrument and take your lab to the next level. Available personalized learning paths based on the latest memory science ensure better knowledge retention, and automated onboarding and enrollment means you’ll get up and running faster.
SCIEX Now Learning Hub offers the most diverse and
flexible learning options available, with best-in-class content that
helps you to get the most out of your instrument and take your lab
the next level. Available personalized learning paths based on the
latest memory science ensure better knowledge retention, and
onboarding and enrollment means you’ll get up and running faster.
SCIEX Learning Manager provides you with the infrastructure to assign, monitor and report on your staff's
competency through a single digital platform. Effectively manage the training process for new hires, ensure
continuous staff development and access information with a single log-in to your SCIEX account.
You can browse, filter, or search our
extensive list of training offerings. Choose from over 100
eLearnings or search for an instructor-led course near you. Once you
select the course you want to take, you will be directed to
Learning Hub for enrollment (login required).
Login to SCIEX Now Learning Hub
Success Programs at Your
Scientist Training at Your Site
Visit all Training
SCIEX Now Learning Hub
Manage my instruments
SCIEX Now New Feature Request
Visit your SCIEX
Declaration of conformance
Safety data sheets
Certificates of analysis
View All regulatory documents
Software and IT services
LC-MS service plans
Protect Plus Suite for your new LC-MS
CE service plans
Clinical service plans
StatusScope remote monitoring
Software accelerator program
Software support plans
Software support policy
Premium access content
Academic partnership program
View all partnership programs
Join the SCIEX community today to
interact with your peers, share and exchange ideas, develop
your knowledge, stay up-to-date with the latest products,
post insights and questions, comment on others and receive
support. This community is designed to help you, our
customers, move science forward and get the answers you
need. We’re committed to engaging with and listening to you,
to create the best customer experience possible and to
contribute to the success of your work.
Environmental / Industrial
Food and Beverage
Life Science Research
Now Feature Requests
View All Community
Echo® MS Center Of Excellence
Our favorite papers
Meet our executives
In the news
You've got questions. We've got experts who
can help. Contact us to find out more, talk to a specialist, explore
solutions or get expert support.
Request a quote
SCIEX success network
Request hosted catalog
Global public relations
Bosnia and Herzegovina
United Arab Emirates
United Republic of Tanzania
AB Sciex is doing business as SCIEX. © 2010-2018 AB Sciex. The trademarks mentioned herein are the property
of the AB Sciex Pte. Ltd. or their respective owners. AB SCIEX™ is being used under license. Beckman
Coulter® is being used under license. Product(s) may not be available in all countries. For
information on availability, please contact your local representative. For
research use only. Not for use in diagnostic procedures.
This guidance provides supplemental instructions for protecting your SCIEX acquisition and processing computers. This guidance is intended to supplement rather than replace your current IT policies, requirements, and practices. We suggest that you consult with your IT department before implementing any of the recommended changes.
Although SCIEX computers are released with a general use operating system, we recommend that you treat the computer as a specialized system that is an extension of the instrument itself. To safeguard the computer, use the computer only to perform the steps required for your workflows, not for additional purposes. We recommend that you follow the security best practices outlined in this document for both acquisition and processing computers.
Do not use obsolete operating systems
Obsolete operating systems have vulnerabilities and security gaps that can be exploited by attackers. To protect the computer, make sure that it is running Windows 10. These operating systems have enhanced security features.
Disable USB ports
USB devices can be programmed to spread viruses to any computer they touch. They can infect computers at the boot stage, before antivirus tools can intervene. To protect the computer, disable the USB ports on the front panel of the computer. Make sure that the USB ports on the back panel remain enabled for Service use.
Do not browse the Internet from the computer
Browsing the Internet from your computer greatly increases the risk of a malware infection. Certain malware can automatically infect your computer by visiting a compromised website without any operator intervention. Downloading and installing applications from the Internet greatly increases the surface area of attack and is strongly discouraged.
Do not use email on the computer
Email is the number one vector of attack for delivering malware. Most malware is delivered via email attachments or malicious links within emails. Using email on the computer greatly increases the risk of a potential malware infection. We strongly recommend that no email activity be performed on the computer.
Do not install any unnecessary third-party software
Installing additional software on your computer increases the attack surface for potential infections. Malware authors often exploit vulnerabilities in third-party applications (like Adobe Flash) to exploit the underlying operating system. We recommend that, whenever possible, you do not perform additional work on the acquisition computer. Instead, use a computer that is intended and protected for such use. If third-party applications must be installed, then we recommend that they be kept up-to-date with the latest security patches.
Establish strong password policies
Make sure that your password is at least 8, and preferably 10, characters long and a mixture of uppercase, lowercase, alphanumeric, and special characters. Enable a screen saver password and inactivity timeout. We recommend that the timeout be 10 minutes. Lock the computer when stepping away from it. Do not share your password with others.
Enable Windows Update
Making sure that critical security patches are installed is essential to maintaining the security of the computer. Our recommended setting is to notify you about the availability of updates and to allow you to select which patches to install and when. This option provides the flexibility to ensure that the installation does not negatively affect acquisition from the instrument. Organizations must balance their security needs and risk tolerance with their need to apply usability patches immediately on release. However, we also recommend that you do not run any Windows updates during SCIEX software acquisition and data processing.
Install antivirus software
While it is a widely acknowledged good practice to employ antivirus and backup software, these applications can interfere with the real-time nature of the SCIEX acquisition software. Some antivirus and backup applications are configured by default to automatically scan and archive a file immediately after creation. Because SCIEX acquisition software can perform multiple writes to a single data file during an acquisition sequence, these real-time features must be disabled to prevent the antivirus or backup software from locking the data file while it is still needed by the SCIEX software application. Many widely-used applications can be configured to either disable real-time protection or ignore certain file-types and paths. Failure to do so might result in either failed acquisitions or acquisitions that take longer to complete than expected.
Follow these guidelines when configuring antivirus software on the acquisition computer:
Also ignore any folders containing drivers for connected devices, such as Eksigent LC systems.
Note: The default installation location for the Analyst Data folders is D:\. These folders might be installed on a different drive.
For example, in the Symantec Endpoint software, the following settings have been found to improve performance during data acquisition:
For users running IDA and Scheduled MRM™ workflow on TripleTOF®, QTRAP®, and X500 QTOF systems, antivirus software might interfere with data acquisition and cause delays with acquisition of data points. We recommend that either you disable real-time antivirus protection, antivirus scheduled scans, and other data-intensive background tasks for these acquisition scenarios or perform validation for your specific antivirus and use case scenarios. After acquisition is complete, re-enable the real-time antivirus.
For instructions on how best to configure your particular antivirus or backup software, contact your antivirus or backup software provider.
Enable Windows Firewall (currently enabled by default)
As an additional layer of security, we recommend that the Windows Firewall remain enabled. The Windows Firewall has been turned on by default and is set to allow only a minimal number of necessary Windows services.
Keep other applications up to date
The SCIEX computer comes with Adobe Reader to allow operators to view our guides and documentation. We recommend that updates be installed as required, to reduce possible attack vectors. We recommend that the user guides and documentation be viewed on a computer other than the acquisition computer.
Leave network discovery turned off
Network discovery allows the computer to discover other computers on the network, but it also allows other computers to discover the computer. If the computer is discoverable, then it can be scanned for vulnerabilities. Keeping this setting disabled has little impact on your ability to access any resources.
Turn off AutoPlay (currently enabled for CD/DVDs and not removable drives)
Malware can take advantage of the AutoPlay (auto run) functionality as a mechanism to infect a computer. Because of the large-scale global outbreak of the Conflicker virus in 2008, Microsoft changed the behavior of AutoPlay for removable devices only. We recommend disabling AutoPlay for all media types, including removable and CD/DVD devices.
The frequency of backup of computers should be commensurate with organizational requirements and the criticality of the data that is generated. Making sure that backups are functional is a vital component of overall data management and essential to recovery in the event of a malicious attack, hardware failure, or software failure. Do not back up the computer during data acquisition, or make sure that the files mentioned previously are ignored by the backup software. We strongly recommend that a full backup be taken of the computer prior to installation of any security updates. This will facilitate a rollback in the rare case that a security patch affects any application functionality.
Enable Internet Explorer security settings (if browsing the Internet is absolutely required)
While we strongly recommend that Internet browsing not be conducted on the computer, if you choose to do so then you should enable security settings that will help to protect your computer. These include:
If you have any questions regarding the security of your system, please contact SCIEX Support at https://sciex.com/support
If you would like to arrange for SCIEX Service to perform on-site securing of your system, please email firstname.lastname@example.org
The destination for all your support needs