Comprehensive visibility, risk management, and control over employee and remote third-party vendor access
Secure Remote Access (SRA) minimizes the risks remote users, including employees and third-party vendors, introduce to OT networks. It provides a single, manageable and clientless interface that all external users connect through, completely segregated from the internal network, prior to performing software upgrades, periodic maintenance, and other support activities on assets within industrial control system networks. SRA allows organizations to extend access to important assets - all without compromising security.
SRA acts as a security middleman between remote users and industrial devices. It enforces password management, authentication and access control policies for remote connections while monitoring and recording remote sessions.
see howEliminate direct interactions between remote users and network assets and enforce a single access pathway.
Consolidated tracking, approval, and auditing of remote access requests from a centralized location.
Define and enforce remote diagnostics and maintenance operations conducted via locally installed applications.
SRA provides full visibility and control over 3rd party and employee access before, during and after a remote session takes place. Dedicated workflows enable administrators to capture, manage and authorize user access requests along with purpose, length and frequency data. With “over the shoulder” monitoring, administrators are able to observe user activity in real-time and terminate the session if and as needed.
Monitor, review, and validate stated versus actual remote session activity.
Ensure system and process integrity by proactively tracking and alerting on changes within the environment.
Validate that remote access control policies are being consistently implemented – leveraging real-time or post-session video recordings.
Passwords, user accounts or credentials, are a common entry point for hackers when attempting to compromise a network. SRA eliminates the direct interaction between remote users and OT via a centralized management for all user credentials, keeping them safe from prying eyes and out of the hands of the wrong people.
Remove the need to share passwords with multiple individuals or across 3rd party organizations.
Reduce the overhead associated with managing of temporary or permanent user passwords.
Implement a unified security governance model leveraging existing security resources across both IT and OT
Provides video recording of each session, as well as reporting capabilities, filtered by user, asset or session.
Securely stores user and asset credentials. Eliminate shared passwords schemes, easily manage password changes and avoid risks from valid passwords of non-active users.
Located in the DMZ, Secure Remote Access can function as the exclusive gatekeeper for all outbound and inbound file traffic between the IT and OT networks.
Provides video recording of each session, as well as reporting capabilities, filtered by user, asset or session.
Securely stores user and asset credentials. Eliminate shared passwords schemes, easily manage password changes and avoid risks from valid passwords of non-active users.
Located in the DMZ, SRA can function as the exclusive gatekeeper for all outbound and inbound file traffic between the IT and OT networks.
Secure Remote Access is the access policy enforcement and control product within the Claroty Platform for ICS networksDownload >>
Watch the video to see Claroty's Vice President of Product, Yaron Paryanty, provide a hands-on demonstration of Claroty’s comprehensive OT cyber-security suite including the following: • Continuous Threat Detection • Secure Remote Access • Enterprise Management Console • Security Posture AssessmentWatch Now >>
Extreme Visibility for Better Threat Detection and Reduced TCO: Whether it's vulnerability & patch management or threat detection & remediation, Claroty’s “extreme visibility” helps make your ICS network more secure.Watch Now >>