ProSoft Insights / Work Smarter

Considerations for Remotely Connecting to Clients’ Equipment

Rechercher

Catégories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Articles récents

Gain Wi-Fi 6 Connectivity from Latest ProSoft Industrial Radio

20 nov, 2024 / Infos produits

We’re happy today to share the news that ProSoft has released its first Wi-Fi 6 industr...

MQTT’s Role in IT/OT Convergence

30 oct, 2024 / Points techniques

IT’s data can play a major role in OT’s processes, ensuring goals are met and issues ar...

What Do You Need to Modernize? This Superstar Gateway Can Help

16 oct, 2024 / Infos produits

We’d like to think that the AN-X4 modernization gateway is something of a superstar sol...

Should You Use Cellular or Wi-Fi to Connect AMRs and AGVs?

12 sept, 2024 / Points techniques

The demands on logistics facilities and material handling applications remain supersize...

Considerations for Remotely Connecting to Clients’ Equipment

Post-installation service commitments have provided a new revenue source for machine builders and system integrators, but have also introduced complexities that need to be addressed.

Being able to remotely access your clients’ equipment as needed is a must for many vendors for two key reasons:

∙ During the pandemic, the ability to remotely access equipment has been key so companies can ensure the safety of vendors and clients’ on-site employees.

∙ Prior to the pandemic – and surely afterward as well – fulfilling these service contracts remotely has been a cost-effective option for the vendor, and helps reduce downtime for the client as well. (We love a win-win.)

However, some customers may be reluctant about this process for a major reason: They think they won’t be able to control vendors’ access to their machines, or other portions of their facility.

Securely Connect to Only Required Equipment

The concern about controlling access is a valid one. And unfortunately, some remote access techniques – especially those that aren't intended for industrial applications – do not allow for customized access control. This type of method is typically a PC with a remote desktop connection, as compared to a more secure, dedicated remote machine access gateway.

A PC in the Machine Zone of a client’s facility – essentially comprising their machine control equipment and the network it resides on – has access to the other local equipment on that network, and can serve as an entry point for cyberattacks into that area and beyond. While your client may have safeguards in their facility, that remote desktop connection may not be protected by their efforts.

In contrast, a dedicated cellular or wired remote machine access gateway can plug in to the local machine network on one side and an Internet-accessible, secure wide area network on the other. Since it’s intended only for remote access, the gateway wouldn’t have PC capabilities and thus would not provide a platform for the attacks that a PC can. This restricted access and dedicated purpose help make this option an acceptable one for clients’ IT departments.

Requesting Access

In addition, clients may have instances where they don’t want you to access the equipment at a certain time, given their real-time knowledge of the plant. For example, an emergency or even maintenance in one part of the facility could affect the operation of a vendor-supplied machine.

In this case, using an electronic request process can help control machine access. With a virtual lockout-tagout approach, the person who needs to remotely connect to the equipment would need to send in a timed request before doing so. The approver at the client site could then decide whether to grant access, or deny the request based on the current status at the plant. (Belden Horizon, formerly known as ProSoft Connect, features this type of approval process, which is logged and can be used for future forensic analysis.)

Learn more about remote connectivity solutions that benefit both clients and vendors.