SlideShare a Scribd company logo
SECURE REMOTE DEVICE/ EQUIPMENT
ACCESS
1
• Importance of Remote Device Access
• Kalki.io Device Access Pack as Service
• Benefits of Device Access Pack
• Key Features of Device Access
• Extended Connectivity options
• Security Considerations in Remote Access
• Comparison with traditional VPN based approaches
• Application Areas & Device Types
2
Agenda
Remote Device Access?
LAN/ RS232/ USB
Edge
Device
• Diagnostics & Troubleshooting
• Online data Monitoring
• Configuration Update
• Firmware update
• Reduces support time & Cost
• Improves productivity
Lets look at how kalki.io address some key factors which is
required for a Secure Remote Access Solution
4
Introduction to Kalki.io Device Access Pack
Cloud based secure remote device access and management
service for your equipment and assets

Recommended for you

Access-control-system
Access-control-systemAccess-control-system
Access-control-system

Access control system for single to multi location security aspects.Not only access but access to multiple services within facility like elevator control and parking access

access-control-systemacsaccess-reader
IoT Key Elements
IoT Key ElementsIoT Key Elements
IoT Key Elements

IoT Key Elements demonstrated on Homie framework Presented in IoT Bratislava meeting Recorded session (in Slovak): https://www.youtube.com/watch?v=ov4M9oxFLxI

internet of thingssecurityota
Ia15 network situation awareness Lumeta Europe
Ia15 network situation awareness    Lumeta EuropeIa15 network situation awareness    Lumeta Europe
Ia15 network situation awareness Lumeta Europe

Vertical scroll overview - how to use Threat Intelligence Information to track and remediate connectivity you don't want on your network.

network situation awareness
EquipmentManufacture
• Improve reliability
by pro-active
maintenance
• Increase asset
productivity by
reducing
downtime AssetOwners
• Improves
Productivity by
reducing
downtime
• Reduce
estimated
replacement cost
• Reduce
unplanned
incidents using
monitoring and
predictive
maintenance
O&MServiceProviders
• Reduce O&M
Costs
• Protects assets
and equipment by
taking on time
actions
• Enable remote
diagnostics of
assets
5
Benefits
Extended Connectivity Options
using kalki.io Device Access Pack
Edge Device with
SyncConnect
IP Devices
Serial Devices
USB Devices
Device with
syncProxy Service
Corporate firewall
Proxy to extend Corporate
Private network to kalki.io
securely
PC
Intranet
Devices
connected to intranet
Remote Connector
cloud/on premises
Connectivity
• Connectivity
independent of the
communication
protocol
• Flexible and scalable
unlike VPN based
solution
• Adaptive
communication as
per underline link
type (GPRS/ LAN/
RF)
User Friendly
Configuration
• Simple and easy
connectivity using
windows compatible
remote engineering
connector
• Centralized
configuration & No
local settings needed
• Reduces complexity
in setting up the
secure network
Securing Data
Transportation
• Encrypted
communication using
TLS1.2 based
transport layer
security
• Secured Role based
access control using
PKI
• Multi factor
authentication
• Firewall friendly
7
Key Features
8
Security Considerations in Remote Access
Control and Manage
Accessibility
• Role based access control
• Public key infrastructure
• Token based 2FA as option
• Lockout device from multiple
access
Confidentiality of packet
exchange
• TLS1.2 encrypted tunnel prevents
man in the middle attack
• Independent of network service
provider security
Integrity of Operations
• User and Device Identity using
X509 certificates
• Safety of assets and people
• Maloperations of the device
24/7 Availability
• Multi region deployment (DR)
• Automatic load sharing
• Resistance to denial of service
Traceability of Actions
• Maintains user access
• User actions and connectivity state
are logged

Recommended for you

Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender

Gatedefender is a network security appliance that provides comprehensive perimeter security for corporate networks. It protects networks from external threats through features like a robust firewall, IPS, antivirus scanning, email filtering, and web filtering. Gatedefender also aims to improve employee productivity by blocking non-work websites and prioritizing important business applications. The appliance is easy to manage through a cloud-based console and provides reports and dashboards for network monitoring. It offers a flexible, all-in-one security solution integrated within existing IT infrastructures.

business servicesgatedefenderpanda security
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions

Financial institutions are constantly seeking to better serve their customers and maintain a competitive edge through new technology innovations and digital transformation initiatives, yet they often fall behind on delivering these new innovations into production. Network and security operations teams are often hampered by manual, slow and error-prone security policy change management processes, and the ever-increasing demands of industry regulations. It often takes several days, or even weeks to process a single change across a complex enterprise environment, which often needs hundreds of these changes each month, directly impacting time-to-market. Geared towards the specific challenges of financial institutions, this webinar will provide technical best practices for managing network security policy changes while reducing risk and enforcing compliance and will cover: • Key industry metrics that compare security environments in and outside the finance industry. • The state of network security and management challenges • How to overcome security management complexity with automation • How to address the ever-increasing demands of the financial industry regulations

security policy managementfinance
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443

With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe. Topics Covered in this Seminar Include: Overview Of Cyber Threat Introduction - ISA IEC Industrial Control Security Standards An Example - Advanced Persistent Threat (APT) ISA/IEC 62443-3-2 Network Separation - An APT countermeasure The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards ISA/IEC 62443 Cybersecurity Standards Current Efforts The Future of ISA/IEC 62443 Cybersecurity Standards

Comparison with VPN based solution
No role based accessUser level access
Network specific access controlDevice specific access control
Audit-trail for network connectivity onlyAudit-trial for network and device level access
Limited control on lossy networksBetter performance on lossy network
Mostly requires service provider hardwareWorks on third party hardware
Limited Scalability in number of connectionsUnlimited connection as no dependency with IP
UI to monitor status in remote PC
vs
Limited option to monitor status at Remote PC
Browse and connect to device Connect using IP address
10
Applications & Devices
Process Industries Power EV Renewable Water TreatmentManufacturing
Industries
PLC Remote Terminal UnitsUPS/ InvertersControllers Protection Relays
THANK YOU
Copyright © Kalkitech / ASE. All rights reserved. 11
www.kalkitech.com SALES: sales@kalkitech.com
SUPPORT: support@kalkitech.com

More Related Content

What's hot

Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
Honeywell Cybersecurity
Honeywell CybersecurityHoneywell Cybersecurity
Honeywell Cybersecurity
kphodel
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
ManageEngine, Zoho Corporation
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
Techera Consultants
 
IoT Key Elements
IoT Key ElementsIoT Key Elements
IoT Key Elements
Peter Hanzlik
 
Ia15 network situation awareness Lumeta Europe
Ia15 network situation awareness    Lumeta EuropeIa15 network situation awareness    Lumeta Europe
Ia15 network situation awareness Lumeta Europe
Bryan Munro-Smith
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
Panda Security
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions
Maytal Levi
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
Jim Gilsinn
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
Teleport
 
XenAppDoc
XenAppDocXenAppDoc
XenAppDoc
Matt R
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent Monitoring
Onomi
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
Leo Mark Villar
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 
Lowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of OwnershipLowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of Ownership
Creekside Marketing Group, LLC
 

What's hot (20)

Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Honeywell Cybersecurity
Honeywell CybersecurityHoneywell Cybersecurity
Honeywell Cybersecurity
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
IoT Key Elements
IoT Key ElementsIoT Key Elements
IoT Key Elements
 
Ia15 network situation awareness Lumeta Europe
Ia15 network situation awareness    Lumeta EuropeIa15 network situation awareness    Lumeta Europe
Ia15 network situation awareness Lumeta Europe
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
XenAppDoc
XenAppDocXenAppDoc
XenAppDoc
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent Monitoring
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Lowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of OwnershipLowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of Ownership
 

Similar to Secure remote device access

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
Motty Ben Atia
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
kkhhusshi
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Mobile Based Lan Monitoring.pptx
Mobile Based Lan Monitoring.pptxMobile Based Lan Monitoring.pptx
Mobile Based Lan Monitoring.pptx
workspaceyks
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
Bharat Sinha
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
SandeepAgrawal98
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
rkoscak
 
firewall
firewallfirewall
firewall
Chirag Patel
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
Rivetz
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
David Wallom
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
Great Wide Open
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
Cisco Canada
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 

Similar to Secure remote device access (20)

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Mobile Based Lan Monitoring.pptx
Mobile Based Lan Monitoring.pptxMobile Based Lan Monitoring.pptx
Mobile Based Lan Monitoring.pptx
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
firewall
firewallfirewall
firewall
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 

More from Nirmal Thaliyil

Remote management and data access of solar pv systems
Remote management and data access of solar pv systemsRemote management and data access of solar pv systems
Remote management and data access of solar pv systems
Nirmal Thaliyil
 
Cloud based dlms cosem metering head end
Cloud based dlms cosem metering head endCloud based dlms cosem metering head end
Cloud based dlms cosem metering head end
Nirmal Thaliyil
 
Monitoring MV& LV Distribution assets using LoRaWAN
Monitoring MV& LV Distribution assets using LoRaWANMonitoring MV& LV Distribution assets using LoRaWAN
Monitoring MV& LV Distribution assets using LoRaWAN
Nirmal Thaliyil
 
Enabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysEnabling utility protocols in Edge gateways
Enabling utility protocols in Edge gateways
Nirmal Thaliyil
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
Ami system using dlms
Ami system using dlmsAmi system using dlms
Ami system using dlms
Nirmal Thaliyil
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
Nirmal Thaliyil
 

More from Nirmal Thaliyil (7)

Remote management and data access of solar pv systems
Remote management and data access of solar pv systemsRemote management and data access of solar pv systems
Remote management and data access of solar pv systems
 
Cloud based dlms cosem metering head end
Cloud based dlms cosem metering head endCloud based dlms cosem metering head end
Cloud based dlms cosem metering head end
 
Monitoring MV& LV Distribution assets using LoRaWAN
Monitoring MV& LV Distribution assets using LoRaWANMonitoring MV& LV Distribution assets using LoRaWAN
Monitoring MV& LV Distribution assets using LoRaWAN
 
Enabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysEnabling utility protocols in Edge gateways
Enabling utility protocols in Edge gateways
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Ami system using dlms
Ami system using dlmsAmi system using dlms
Ami system using dlms
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
 

Recently uploaded

Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 

Recently uploaded (20)

Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 

Secure remote device access

  • 1. SECURE REMOTE DEVICE/ EQUIPMENT ACCESS 1
  • 2. • Importance of Remote Device Access • Kalki.io Device Access Pack as Service • Benefits of Device Access Pack • Key Features of Device Access • Extended Connectivity options • Security Considerations in Remote Access • Comparison with traditional VPN based approaches • Application Areas & Device Types 2 Agenda
  • 3. Remote Device Access? LAN/ RS232/ USB Edge Device • Diagnostics & Troubleshooting • Online data Monitoring • Configuration Update • Firmware update • Reduces support time & Cost • Improves productivity Lets look at how kalki.io address some key factors which is required for a Secure Remote Access Solution
  • 4. 4 Introduction to Kalki.io Device Access Pack Cloud based secure remote device access and management service for your equipment and assets
  • 5. EquipmentManufacture • Improve reliability by pro-active maintenance • Increase asset productivity by reducing downtime AssetOwners • Improves Productivity by reducing downtime • Reduce estimated replacement cost • Reduce unplanned incidents using monitoring and predictive maintenance O&MServiceProviders • Reduce O&M Costs • Protects assets and equipment by taking on time actions • Enable remote diagnostics of assets 5 Benefits
  • 6. Extended Connectivity Options using kalki.io Device Access Pack Edge Device with SyncConnect IP Devices Serial Devices USB Devices Device with syncProxy Service Corporate firewall Proxy to extend Corporate Private network to kalki.io securely PC Intranet Devices connected to intranet Remote Connector cloud/on premises
  • 7. Connectivity • Connectivity independent of the communication protocol • Flexible and scalable unlike VPN based solution • Adaptive communication as per underline link type (GPRS/ LAN/ RF) User Friendly Configuration • Simple and easy connectivity using windows compatible remote engineering connector • Centralized configuration & No local settings needed • Reduces complexity in setting up the secure network Securing Data Transportation • Encrypted communication using TLS1.2 based transport layer security • Secured Role based access control using PKI • Multi factor authentication • Firewall friendly 7 Key Features
  • 8. 8 Security Considerations in Remote Access Control and Manage Accessibility • Role based access control • Public key infrastructure • Token based 2FA as option • Lockout device from multiple access Confidentiality of packet exchange • TLS1.2 encrypted tunnel prevents man in the middle attack • Independent of network service provider security Integrity of Operations • User and Device Identity using X509 certificates • Safety of assets and people • Maloperations of the device 24/7 Availability • Multi region deployment (DR) • Automatic load sharing • Resistance to denial of service Traceability of Actions • Maintains user access • User actions and connectivity state are logged
  • 9. Comparison with VPN based solution No role based accessUser level access Network specific access controlDevice specific access control Audit-trail for network connectivity onlyAudit-trial for network and device level access Limited control on lossy networksBetter performance on lossy network Mostly requires service provider hardwareWorks on third party hardware Limited Scalability in number of connectionsUnlimited connection as no dependency with IP UI to monitor status in remote PC vs Limited option to monitor status at Remote PC Browse and connect to device Connect using IP address
  • 10. 10 Applications & Devices Process Industries Power EV Renewable Water TreatmentManufacturing Industries PLC Remote Terminal UnitsUPS/ InvertersControllers Protection Relays
  • 11. THANK YOU Copyright © Kalkitech / ASE. All rights reserved. 11 www.kalkitech.com SALES: sales@kalkitech.com SUPPORT: support@kalkitech.com