VPN gateways

Guaranteed secure access for the manufacturing industry
Estimated Reading Time: 2 Minutes

Exter­nal access – a ques­ti­on of security

In the age of Indus­try 4.0 and the Inter­net of Things (IoT), secu­re VPN gate­ways in con­nec­tion with VPN access points are the pre­re­qui­si­te for pro­tec­ting machi­nes from unaut­ho­ri­zed access.

The con­trol and main­ten­an­ce of any machi­ne is incre­a­singly being car­ri­ed out remo­te­ly, which saves com­pa­nies con­si­derable tra­vel cos­ts. For some of our cus­to­mers it was com­mon for spe­cia­lists to be flown in from Ger­ma­ny to the USA, which is not only an expen­si­ve under­ta­king, but in times of Covid has also beco­me more and more of a logisti­cal problem.

But can com­pa­nies rely on the machi­ne manu­fac­turer’s remo­te access modu­les actual­ly com­ply­ing with cur­rent safe­ty standards?

Which com­pa­ny wants or is allo­wed – whe­ther its data pro­tec­tion regu­la­ti­ons – to tole­ra­te third par­ties in its network?

Hard­ly any con­trac­tu­al regu­la­ti­ons for IT security

When manu­fac­tu­ring sys­tems are main­tai­ned by exter­nal third par­ties and the­re is no secu­re and up-to-date solu­ti­on, hacker attacks can easi­ly cau­se mil­li­ons in dama­ge. Unfor­tu­n­a­te­ly, alar­ming secu­ri­ty vul­nera­bi­li­ties appe­ar every day.

The simp­le rea­son: IT secu­ri­ty is eit­her not part of the core busi­ness of machi­ne manu­fac­tu­rers or – the more com­mon case – the machi­nes are con­trac­tual­ly expli­ci­tly not per­mit­ted for direct access from outside.

Best pro­tec­tion against hackers

Our rou­ters are manu­fac­tu­rer-inde­pen­dent and can be con­fi­gu­red indi­vi­du­al­ly. We rely on trans­pa­rent open source code, hard encryp­ti­on, secu­re pass­words, uni­que authen­ti­ca­ti­on up to mul­ti-fac­tor and hard­ware authen­ti­ca­ti­on as well as clear access control.

In order to addi­tio­nal­ly pro­tect your data behind the VPN rou­ter, we can also cas­ca­de the access sys­tem so that attemp­ted attacks are no lon­ger worthwhile.

5 steps to success

Initial meeting

During the first meeting, we analyze your current situation.

confidentiality

As confidential contracting parties, we sign a non-disclosure agreement.

planning

A factory tour takes place depending on the complexity of the project. An overview of the devices to be maintained and the network infrastructure is created. Billing is based on expenditure with a 50% deposit.

offer

You will receive an individual offer with a schedule. We accompany complex projects with a presentation.

support

We take care of 8x5, 10x5, 12x6 or 24/7 - depending on your needs. And ensure that your gateways always remain hardened and secure. Worldwide.

5 steps to success

Initial meeting

During the first meeting, we analyze your current situation.

confidentiality

As confidential contracting parties, we sign a non-disclosure agreement.

planning

A factory tour takes place depending on the complexity of the project. An overview of the devices to be maintained and the network infrastructure is created. Billing is based on expenditure with a 50% deposit.

offer

You will receive an individual offer with a schedule. We accompany complex projects with a presentation.

support

We take care of 8x5, 10x5, 12x6 or 24/7 - depending on your needs. And ensure that your gateways always remain hardened and secure. Worldwide.
Benefit from our IT know-how and create a better world with us.
FTT Forensic Discovery GmbH
Dammwäldchen 3, 95444 Bayreuth, Germany

Phone: +49 921 730 88 70
Fax: +49 921 730 88 68

Local Court Bayreuth, HRB 6659
FTT Forensic Discovery GmbH
Dammwäldchen 3, 95444 Bayreuth, Germany

Phone: +49 921 730 88 70
Fax: +49 921 730 88 68

Local Court Bayreuth, HRB 6659
© 2022 Forensic Discovery GmbH
magnifiercrossmenu