Safeguard your network from threats that are introduced by unmanaged and unmonitored remote access.
SRA acts as a security middleman between remote users and industrial devices. It enforces password management, authentication and access control policies for remote connections while monitoring and recording remote sessions.
It provides full visibility and control over third-party and employee access before, during and after a remote session takes place. Dedicated workflows enable administrators to capture, manage and authorise user access requests along with purpose, length and frequency data. With “over the shoulder” monitoring, administrators are able to observe user activity in real-time and terminate the session if and as needed.