ProSoft Insights / Technologie Focus

Your Most-Asked Remote Connectivity Questions

Search Insights

Kategorien

Tags

Newsletter

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Letzte Posts

Should You Use Cellular or Wi-Fi to Connect AMRs and AGVs?

12 Sep, 2024 / Technologie Focus

The demands on logistics facilities and material handling applications remain supersize...

Transform Your Water and Wastewater Application’s Connectivity

21 Aug, 2024 / Technologie Focus

Legacy connectivity in water and wastewater operations includes two major communication...

Benefits of Automation in Material Handling Applications

01 Aug, 2024 / Technologie Focus

Adding industrial automation to material handling applications holds many benefits, and...

How Utilities Benefit from Remote Connectivity

12 Jul, 2024 / Technologie Focus

For utilities, remote connectivity offers the potential to limit field visits, reduce d...

Your Most-Asked Remote Connectivity Questions

Remote work is widespread now, but it makes sense that technology that enables remote connectivity is still a frequently discussed topic in industrial automation. Whether it’s about how it works or how it stays secure, it’s important that you understand how remote connectivity works if you intend to use the technology in your application.

One aspect that’s not covered below is some introductory advice: For an industrial, commercial application, you will need a solution designed for that. A standard free desktop application for your computer or something that you might use for personal remote use isn’t up to the same standard as something designed to stay secure and access equipment that in some cases is countries away.

OK, here we go!

Q: What security aspects should I consider?

A: There are a few security measures we recommend looking for, including:

· No software to install or maintain: This is a major entry point for hackers, and requires your team’s time to maintain. Instead, opt for a service that the provider maintains (while ensuring data stays private).

· App-based two-factor authentication: You know those codes you get automatically sent to your phone for personal website logins? Yep, you want something different for this type of application. This authentication is a stronger way to verify you are who you say you are and should have access to your equipment.

· User-defined password policies and single-sign on: These are must-haves for some companies’ IT teams, and with good reason. These password policies and SSO give your company more control over access, and helps avoid weaker password questions. In addition, when team changes occur, SSO can help ensure access stays up to date.

Q: As a system integrator, I have to remotely connect to clients’ equipment sometimes. How can I reassure them on the security of an outside vendor connecting to their devices?

A: This is a valid concern for end users for any short- or long-term vendors they work with, so it’s great to proactively address it. We recommend option for a platform that allows your client to control what equipment you have access to; the time you’re able to connect; and the duration for connectivity. As an added safety and regulatory measure, it’s best to keep an automatic log of this usage; some platforms automatically offer this audit log.

Q: I have to reach some very remote spots. Can the connections really work there?

A: Yes! The ubiquitous nature of cellular communications have made this type of connectivity a reality for even the hardest-to-reach locations, including mining areas and other harsh environments for traditional connectivity methods.

Q: How is the connection formed?

A: Different platforms may have their own specific techniques. But generally a secure VPN connection is created between the platform and the gateway or device you’re monitoring. Using a platform that has one-time-use VPN tunnel connections is ideal from a security standpoint.

Q: Can I use it with my own cloud center, or have an on-premises deployment?

A: Some platforms (including Belden Horizon Console) have this as an option for companies that prefer to stick with an existing cloud tenant or private center, or require on-prem deployment for regulatory or security reasons. For on-prem deployment, experts are also available to help with installation and maintenance.