Secure Remote Access

Still need to travel on-site to access your automation stack? Your team is afraid of OT remote access due to security concerns? Our remote connectivity service offers a unique security concept with end-to-end connections from secure cloud servers and fine-grained user permissions. 

Get our secure remote access solution to increase productivity of your automation engineers and avoid downtime.

Secure Remote Access benefits

  • Use “security first” remote access
  • Avoid additional hardware
  • Connect workstations only when needed
  • No need to change any network configuration
  • Set fine-grained user permissions on device level
Contact us

Use “security first” remote access

The SDA connectivity service offers secure remote access based on state-of-the-art security principles. Certificate-based and encrypted MQTT communication is used for
base communication. Encrypted Wireguard VPN connections are opened on demand to connect to OT devices. All connections are logged to ensure full transparency and traceability.

Avoid additional hardware

The SDA connectivity client can be installed on existing hardware without the need of yet another dedicated device. You can even use a virtual machine on a local server to run the service. No need to procure and manage additional devices.

Connect workstations only when needed

The SDA remote access solution connects secured cloud servers to OT devices. By default there is no access for unsecured engineering workstations. Workstation access can be granted to demand for selected users in case connectivity for legacy applications is required.

No need to change any network configuration

Our connectivity solution is compatible with a wide variety of on premise network configurations. The client can be run either inside a demilitarized zone or directly inside a production cell. Choose the best configuration based on your existing security concept and network architecture.

Set fine-grained user permissions on device level

Bring your security to the highest level by setting fine-grained access permissions on level. Choose for each user which devices can be accessed remotely. Work securely with externals by setting temporary access rights to specific devices and tracing all actions and configuration changes.