Increase security - lower costs

zedas®secure unites services which are required in digitised production systems and, up until now, were provided by each manufacturer or builder separately.

Lower the costs for security audits by centralising the following services in your production system with zedas®secure!

  • Secure remote maintenance access
  • Secure access from the “office network”
  • Bidirectional data exchange
  • Networking production systems
  • Firewall security zones 
  • Secure access for third-party devices on site (Network Access Control)

Lower costs by preparing services centrally, such as:

  • Preparing operating system patches and updates
  • Preparing and approving anti-virus patterns
  • Current virus protection
  • Securing & restoring systems and data
  • Centralised printers
  • Monitoring

What you can achieve!

The use of zedas®secure can mean the solution to a particular problem. But above all, it is a well thought-out, strategic approach to solving many current security problems of networking and digitising production systems in one go.

  • Digital sovereignty over software, networks, end devices and data
  • Taking into account special requirements of production environments
  • Controlling digital access by production controllers
  • Simple management and use by production personnel
  • Secure networking of features and systems provided by different manufacturers and suppliers
  • A deep layer of defence by staggering tried and tested security solutions
  • Centralisation • Integrated monitoring

Remote access to systems - not without approval

The zedas®secure virtual computers provided for each external worker in a dedicated security zone are switched off in their basic state. Even with successful network access, after strong two-factor authentication, the target systems unlocked in the firewall policy cannot be reached. This means that external service providers are technically forced to sign in via telephone before beginning the remote access.

In a user-friendly app, a shift supervisor collects information on the desired remote access and then starts the allocated computer with the click of a mouse. This barely takes longer than 90 seconds. The app also provides a permanent overview of all inactive and active service computers.

Software at the click of a button – the highlight

After starting a virtual service computer, there is only a shut-down button on their secured desktop interface. In the course of recording the remote access request, the system is asked where the access should be given to. The shift supervisor “conjures up” the necessary application connection on the external service partner desktop with a click of the mouse. This person uses the application exclusively via a remote desktop protocol.

A further highlight is securing the software on the virtual service computer via an underlying application firewall. For each installed service application, there are details stored about which programmes and plug-ins may be started, which target systems may be addressed on which ports and under which parameters the application is allowed. After closing the remote access, the service computers are shut-down and switched off. The application authorisations issued are automatically revoked.

Continue with: Profile | Advantages | FAQ | References | Glossary