Industrial Control System Remote Support
Industrial Control System Remote Access Options
Troubleshooting remotely is the fastest way to get your operation back up and running and Cross is pleased to be able to offer remote support with our service contracts. However, security for remote access is a critical aspect of preserving production assets. The industrial hardened access solutions listed below are designed to:
- Provide secure layers of protection to prevent unwanted access and maintain data integrity
- Work with existing corporate policies and provide additional layers of security
- Deliver a cost effective solution to support production goals
Corporate IT security policies vary greatly, and our options below provide a robust technology designed to work seamlessly within corporate security standards.
CTI
Cross Team Interface
The CTI solution utilizes TeamViewer® software and allows the end-user IT department to deploy and manage the firewall and VPN encryption settings based on corporate policy. The TeamViewer® software provides a secure remote connection utilizing AES 256-bit encryption for data transit and two-factor authentication as an additional layer of protection. This solution allows an end-user to fully manage the external connection security functions to ensure data integrity.
CVI
Cross Virtual Interface
This solution utilizes a Siemens® Scalance firewall module that provides IPsec Virtual Private Network (VPN) tunnelling with stateful packet inspection, NAT/NAPT routing coupled with data encryption using SOFTNET security client to manage authentications. The hardware and setup services are provided and the end-user IT department shall deploy this between the IT and OT networks. The end-user is responsible for providing an external firewall and/or VPN based on corporate security policies.
CCI
Cross Cellular Interface
The cellular solution offers a hardware enclosure with the Siemens® Scalance firewall listed in the above option but coupled with a cellular connection. This option provides access without using the IT network but uses all of the best security functions available. This option adds an additional layer of protection by requiring the remote connection to locally be enabled and it will physically disconnect after time-out. This enhancement removes the human error from a possibility to preserve the data integrity.