Claroty Secure Remote Access
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers

Values

Reduce Costs

Enhance Staff Productivity

Claroty Secure Remote Access

Comprehensive visibility, risk management, and control over employee and remote third-party vendor access

Description

Secure Remote Access

SRA minimizes the risks remote users, including employees and 3rd party vendors, introduce to OT networks. It provides a single, manageable interface that all external users connect through, prior to performing software upgrades, periodic maintenance, and other support activities on assets within industrial control system networks. The system enforces password management, authentication and access control policies for remote connections and monitors and records remote sessions. Network administrators employ SRA to proactively control which users are granted access to industrial control assets, for what purpose, and during what time windows.

Key Benefits

Secure Remote Access delivers organizations the following value:
  • Isolate critical industrial systems from unmanaged and insecure VPN plus “jump box” scenarios
  • Eliminate one of the most critical attack vectors that threat actors have used to gain access to industrial systems -- pathways that have been leveraged in multiple ICS attacks
  • Remove the vulnerability presented by sharing passwords across internal teams or teams working for external contractors
  • Enable granular auditing through video-based session recordings and detailed reporting with advanced filtering options

Use Cases

Network administrators Have full visibility and control over 3rd party and employee accesses before, during and after a remote session takes place. OT Plant/Operation Can monitor and review remote sessions and validate that the user’s stated purpose aligns with the actual session activity. Security Teams and Auditors Can validate that remote access control policies are being consistently implemented in industrial environments, watch active sessions, and review recorded sessions based on a risk assessment.