ProSoft Insights / Work Smarter

Considerations for Remotely Connecting to Clients’ Equipment

Search Insights

Kategorien

Tags

Newsletter

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Letzte Posts

How ProSoft Connect Stays Secure

10 Sep, 2021 / Technologie Focus

At ProSoft, we’ve been getting questions about how to use ProSoft Connect, so we put to...

Your Frequently Asked Questions: Modbus and Modbus TCP/IP

26 Aug, 2021 / Videos

We recently talked with Chris Hines, ProSoft’s Global Technical Support Director, to ge...

How System Integrators Benefit from Always-On Remote Connectivity

12 Aug, 2021 / Work Smarter

Always-on, managed remote connectivity is especially helpful for utilities. For system ...

Planning an Industrial Wireless Network? Here Are Some Resources to Get You Started

28 Jul, 2021 / Videos

The reliability and ease of use you gain from industrial wireless radios make them a gr...

Considerations for Remotely Connecting to Clients’ Equipment

Post-installation service commitments have provided a new revenue source for machine builders and system integrators, but have also introduced complexities that need to be addressed.

Being able to remotely access your clients’ equipment as needed is a must for many vendors for two key reasons:

∙ During the pandemic, the ability to remotely access equipment has been key so companies can ensure the safety of vendors and clients’ on-site employees.

∙ Prior to the pandemic – and surely afterward as well – fulfilling these service contracts remotely has been a cost-effective option for the vendor, and helps reduce downtime for the client as well. (We love a win-win.)

However, some customers may be reluctant about this process for a major reason: They think they won’t be able to control vendors’ access to their machines, or other portions of their facility.

Securely Connect to Only Required Equipment

The concern about controlling access is a valid one. And unfortunately, some remote access techniques – especially those that aren't intended for industrial applications – do not allow for customized access control. This type of method is typically a PC with a remote desktop connection, as compared to a more secure, dedicated remote machine access gateway.

A PC in the Machine Zone of a client’s facility – essentially comprising their machine control equipment and the network it resides on – has access to the other local equipment on that network, and can serve as an entry point for cyberattacks into that area and beyond. While your client may have safeguards in their facility, that remote desktop connection may not be protected by their efforts.

In contrast, a dedicated cellular or wired remote machine access gateway can plug in to the local machine network on one side and an Internet-accessible, secure wide area network on the other. Since it’s intended only for remote access, the gateway wouldn’t have PC capabilities and thus would not provide a platform for the attacks that a PC can. This restricted access and dedicated purpose help make this option an acceptable one for clients’ IT departments.

Requesting Access

In addition, clients may have instances where they don’t want you to access the equipment at a certain time, given their real-time knowledge of the plant. For example, an emergency or even maintenance in one part of the facility could affect the operation of a vendor-supplied machine.

In this case, using an electronic request process can help control machine access. With a virtual lockout-tagout approach, the person who needs to remotely connect to the equipment would need to send in a timed request before doing so. The approver at the client site could then decide whether to grant access, or deny the request based on the current status at the plant. (ProSoft Connect features this type of approval process, which is logged and can be used for future forensic analysis.)

Learn more about remote connectivity solutions that benefit both clients and vendors.