Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
High costs of IT personnel
Shortage of inhouse IT engineers
Values
Reduce Costs
Enhance Staff Productivity
Claroty Secure Remote Access
Comprehensive visibility, risk management, and control over employee and remote third-party vendor access
About Product
Description
Secure Remote Access
SRA minimizes the risks remote users, including employees and 3rd party vendors, introduce to OT networks. It provides a single, manageable interface that all external users connect through, prior to performing software upgrades, periodic maintenance, and other support activities on assets within industrial control system networks. The system enforces password management, authentication and access control policies for remote connections and monitors and records remote sessions. Network administrators employ SRA to proactively control which users are granted access to industrial control assets, for what purpose, and during what time windows.Key Benefits
Secure Remote Access delivers organizations the following value:- Isolate critical industrial systems from unmanaged and insecure VPN plus “jump box” scenarios
- Eliminate one of the most critical attack vectors that threat actors have used to gain access to industrial systems -- pathways that have been leveraged in multiple ICS attacks
- Remove the vulnerability presented by sharing passwords across internal teams or teams working for external contractors
- Enable granular auditing through video-based session recordings and detailed reporting with advanced filtering options
Use Cases
Network administrators Have full visibility and control over 3rd party and employee accesses before, during and after a remote session takes place. OT Plant/Operation Can monitor and review remote sessions and validate that the user’s stated purpose aligns with the actual session activity. Security Teams and Auditors Can validate that remote access control policies are being consistently implemented in industrial environments, watch active sessions, and review recorded sessions based on a risk assessment.