Skip to main content

Remote access for industry and trade

A globalized economy requires a high degree of flexibility and access to data and applications from any location. The ECOS technology meets even the highest requirements for data protection and data security.

Even much higher security regulations than in the office sector apply to remote access to production facilities.

Access to office applications is very diversified and ranges from Outlook Web Access to Microsoft SharePoint, CRM, ERP and MIS systems, or CAD applications. Some systems can be accessed externally by browser, some by terminal server or VD infrastructure, while others require special client software. But they all require an access that is as secure as possible with minimal effort.

Workflow for industry and trade

Typical application scenarios:

Design engineers

It is not uncommon for assembly teams to contact the design department for further information. Internationally active companies often work outside of the normal office hours, especially with time-sensitive projects.

Designers should therefore have a highly secure access to their workplace PC or central CAD systems from their private PC at home.

Project manager

For on-site installation, fast remote data access to information resources in the company is essential in many cases. Besides data security, the requirements for the devices in often harsh working environments must be considered too.

Internationally active companies are aware of the danger of industrial espionage. Sales employees who operate abroad are particularly targeted. Instead of providing the best possible protection, some companies prohibit the storage of company data on notebooks

Controller

In controlling, access to all areas of the company is essential. Overtime is very common, especially towards the end of the fiscal year.

With appropriate security measures, access is also possible from a home PC.

Management

Senior executives need to have access to relevant systems and information from anywhere at any time.

Highly secure access must be guaranteed even when the company notebook or tablet is not available.

The right solution for any requirement

Secure Boot Stick CL ist übergroß vor aufgeklapptem Macbook platziert

Secure Boot Stick CL

Hardened ECOS Secure Linux operating system

All software on the stick

2-factor authentication w/ software certificate

Integrated firewall

Central management

Abbild von silbernem Secure Boot Stick HE

Secure Boot Stick HE


  Hardened ECOS Secure Linux OS

  All software on one stick

  2-factor authentication w/
     software certificate

  Integrated firewall

  Central management

  Hardware-encrypted security

  2-factor authentication w/
     hardware anchor

BSI-approved

Produkt Nahaufnahme des Secure Boot Stick FX

Secure Boot Stick SX


  BSI-approved for VS-NfD,
     EU and NATO RESTRICTED

  Highly secure VS-NfD access w/
     genua genuscreen

  Sealed stick environment

  Extra hardened ECOS Secure Linux

  Multi-factor authentication w/
     smartcard

  Keypad for PIN entry

  Central management and remote
     updating

Are you looking for more information? Do you have any questions?

We are looking forward to your message!