Hardware-Enforced Secure Remote Access for OT Environments

HERA reinvents OT secure remote access with built-in physical protections to deliver unparalleled security for your critical systems.

video-cover.svg
icon-2.png

IT/OT Integration with Physical Segmentation

A physical defense that shields OT environments from all cyber threats while enabling seamless manageable remote access.

icon-4.png

Full-Featured Remote Access

Experience fully secure remote access with everything you need in one solution.

icon-5.png

Reliable & Safe

Battle-proven unidirectional technology that’s successfully protected OT environments globally since 2007.

Hardware-Enforced Remote Access in Action

Embedded Defense, Unparalleled Security

icon-6@2x.png

Physically Securing the OT perimeter

HERA® locks down your OT environments with dual best-in-class unidirectional gateways, eliminating risks of attacks propagating into the OT network.

icon-7@2x.png

Enhanced Protocol Isolation

Physically separate encrypted inbound and outbound channels enable strict protocol isolation, preventing Man-in-the-Middle attacks. Only mouse and keyboard inputs are sent from the client to the server.

icon-8@2x.png

Specialized Client-Side Software

Hardware-enforced Trusted Platform Module (TPM) technology secures key storage to block key theft attacks and uses message encryption to prevent client-side attacks. Binding hardware to the user and site ensures the strongest mufti-factor authentication.

Secure Remote Access with Fine-Grain Control

Session Recording
Session-Recording-4.png

Gain comprehensive visibility and accountability through real-time session recording for all remote access activities. Every user interaction within the OT environment is logged, creating a detailed audit trail for compliance, forensic analysis, and security monitoring.

Session-Moderation-1.png

Monitor up to 10 concurrent active user sessions by one admin and watch them in real time. Disconnect suspiciously behaving users, take control of active sessions, or share your session with another user. Allow others to view your active session for collaboration or oversight.

Fine-Grain-User-Management-1.png

Efficiently manage access with a refined role management system, allowing the creation of user groups and asset groups. Add or remove users, disconnect them from sessions or assets, and assign roles such as moderators, users, or contractors for streamlined control. Seamlessly sync with Active Directory for streamlined and efficient user management across your system.

Implement zero-trust, time-based access to enhance security by verifying every access request. Grant access to specific users only during designated times or within predefined time windows, ensuring precise control and minimizing potential risks.

Logging-SIEM-Reporting-1.png

Log and monitor detailed and extensive metrics within a dedicated monitoring system, providing a clear audit trail for every activity. Logs can also be seamlessly exported to SIEM tools for advanced analysis and security event management, ensuring comprehensive oversight.

Multi-Site-Management-1.png

Easily manage multiple sites from a single interface. Oversee and control operations across various locations without the need for separate logins or interfaces.

Client-Side-Software-1.png

Ensure secure connections with software that sits client-side, eliminating any risk from Man-in-the-Middle attacks

Secure remote access
without the risks of network connectivity.