The State of XIoT Security Report: 1H 2022
Download the Report
Claroty Logo

Claroty Secure Remote Access (SRA)

Claroty SRA delivers frictionless, reliable, and highly secure remote access to industrial environments for internal and third-party users.

Key Benefits of SRA

Unlike traditional remote access solutions—most of which are designed  for IT networks—Claroty SRA is purpose-built for the specific operational, administrative, and security needs of industrial networks.

Streamlines Access for Internal & Third-Parties

SRA removes the complexity and administrative barriers to effective, efficient remote access to industrial environments for both internal and third-party users.

Extends Zero Trust-based Access Controls

Remote access is the most commonly exploited attack vector for industrial environments. SRA eliminates this with a secure architecture and granular access controls.

Offers Full Auditing & Response Capabilities

All SRA user sessions enable live, over-the-shoulder monitoring, live disconnects if needed, and full-length recordings to support audit requests and investigations.

Delivers an Ideal UX that Reduces MTTR

SRA’s purpose-built user experience makes connecting, troubleshooting, and repairing assets fast and easy, no matter where assets or users are located.

Remote Maintenance with SRA

No jump servers here. Whether an internal engineer or third-party vendor, SRA enables all approved users to gain access quickly and painlessly through an intuitive interface that mimics their on-premise workstation. SRA also offers highly secure, controlled, safe access no matter where users, facilities, or assets are located.

Remote Access Administration with SRA

With SRA, IT teams can delegate administration of remote access to plant staff without worrying about compromising security or infrastructure. Since SRA uses a simple, static firewall configuration and secure application tunnel, it eliminates the need for ongoing network changes. New users can be provisioned by leveraging their existing identity provider in accordance with organizational security policies

Role-Based Access Control with SRA

Defining and enforcing granular access controls for industrial assets at multiple levels and geographic locations are essential for minimizing the risks to operations posed by internal and third-party remote users. SRA not only delivers these capabilities, but it also supports a Zero Trust security architecture and champions the least privilege principle.

Comprehensive Monitoring with SRA

Traditional IT remote access tools only offer limited monitoring and auditing capabilities for remote user activity. SRA overs full visibility into user activity, giving the insights needed for optimal management. Administrators have the option to monitor active SRA sessions in real time for troubleshooting, user supervision, and emergency termination if necessary. In addition, SRA automatically records every session to support response actions, investigations, and training.

Remote Incident Management with SRA

SRA integrates Claroty Continuous Threat Detection (CTD) to enable you to detect, investigate, and respond to cybersecurity incidents as they happen. CTD triggers an alert if a user engages in unauthorized activity, such as trying to service assets outside predetermined maintenance windows. From the alert, an administrator can go directly into the SRA session and monitor or disconnect.

Claroty Demo

Want the inside-scoop on how Claroty SRA will enable and secure your XIoT remote access use cases?

Claroty Logo
LinkedIn Twitter Facebook