ProSoft Insights / Work Smarter

Considerations for Remotely Connecting to Clients’ Equipment

Search Insights




Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

How Utilities Benefit from Remote Connectivity

12 jul, 2024 / Technology focus

For utilities, remote connectivity offers has the potential to limit field visits, redu...

New Updates Add (Even More) Versatility to AN-X4 Modernization Gateway

12 jun, 2024 / Product focus

Recently, ProSoft’s Modernization Gateway got two new firmware updates to add to its us...

Reduce Energy Usage by Connecting Building Automation Equipment

22 may, 2024 / Technology focus

Data from your facility’s equipment like boilers, chillers, HVAC systems, air compresso...

Your Most-Asked Remote Connectivity Questions

02 may, 2024 / Technology focus

We’ve got the answers to your most frequently asked questions about industrial remote c...

Considerations for Remotely Connecting to Clients’ Equipment

Post-installation service commitments have provided a new revenue source for machine builders and system integrators, but have also introduced complexities that need to be addressed.

Being able to remotely access your clients’ equipment as needed is a must for many vendors for two key reasons:

∙ During the pandemic, the ability to remotely access equipment has been key so companies can ensure the safety of vendors and clients’ on-site employees.

∙ Prior to the pandemic – and surely afterward as well – fulfilling these service contracts remotely has been a cost-effective option for the vendor, and helps reduce downtime for the client as well. (We love a win-win.)

However, some customers may be reluctant about this process for a major reason: They think they won’t be able to control vendors’ access to their machines, or other portions of their facility.

Securely Connect to Only Required Equipment

The concern about controlling access is a valid one. And unfortunately, some remote access techniques – especially those that aren't intended for industrial applications – do not allow for customized access control. This type of method is typically a PC with a remote desktop connection, as compared to a more secure, dedicated remote machine access gateway.

A PC in the Machine Zone of a client’s facility – essentially comprising their machine control equipment and the network it resides on – has access to the other local equipment on that network, and can serve as an entry point for cyberattacks into that area and beyond. While your client may have safeguards in their facility, that remote desktop connection may not be protected by their efforts.

In contrast, a dedicated cellular or wired remote machine access gateway can plug in to the local machine network on one side and an Internet-accessible, secure wide area network on the other. Since it’s intended only for remote access, the gateway wouldn’t have PC capabilities and thus would not provide a platform for the attacks that a PC can. This restricted access and dedicated purpose help make this option an acceptable one for clients’ IT departments.

Requesting Access

In addition, clients may have instances where they don’t want you to access the equipment at a certain time, given their real-time knowledge of the plant. For example, an emergency or even maintenance in one part of the facility could affect the operation of a vendor-supplied machine.

In this case, using an electronic request process can help control machine access. With a virtual lockout-tagout approach, the person who needs to remotely connect to the equipment would need to send in a timed request before doing so. The approver at the client site could then decide whether to grant access, or deny the request based on the current status at the plant. (Belden Horizon, formerly known as ProSoft Connect, features this type of approval process, which is logged and can be used for future forensic analysis.)

Learn more about remote connectivity solutions that benefit both clients and vendors.