Securely accessing OT systems from the cloud
One of the challenging issues in the Internet of Things (IoT) is how to securely access on-premises OT systems from remote IT environments. This includes...
- Who can access which OT (Operational Technology) sites?
- Who has access to which devices/systems within the OT system in the field?
- Are these personnel accounts/passwords actively managed and do they meet the authentication requirements of information security standards, such as MFA and regular changes?
- Is the remote access service normally disabled to comply with the minimum privilege requirements in information security specifications?
- Is the password for the remote access host generated each time it is opened to prevent different people from using the same password and to comply with the uniqueness requirement in information security standards?
- After personnel connect to the site host, are there any records of the work they perform on the host that are available for auditing?
Remote Desktop Service


Subtitle for This Bl
Text for This Block
NeoEdge Central RDP (Remote Desktop Service) provides a secure, simple, and convenient service that allows you to access OT environments from anywhere, offering the ability to access other devices/systems through the desktop on a host within the environment. Key features of NeoEdge Central RDP include:
1. Centralized and unified management of user authentication and permissions.
Administrators can directly use NeoEdge Central's project management, user management, and role management features to plan the permission relationships between personnel and environments, as well as between personnel and devices/systems. For example:
- Using a Multi-Sites architecture to segment different OT environments, ensuring physical isolation of data and transmission.
- Isolating devices/systems within the environment by project, and assigning projects to the required personnel. After logging in, personnel can only access the devices/systems they are authorized to use.
- External vendor accounts are initially set to a closed mode, and are only activated after going through an application process. They are deactivated once the work is completed.
- All accounts are required to enable MFA (Multi-Factor Authentication) to strengthen security measures.
2. No client-side installation is required.
The NeoEdge Central RDP service uses a browser as the user interface, eliminating the need for additional client software installation. This reduces management costs, eliminates the need for software updates, and mitigates the risk of virus infections.
3. Connect to other devices and applications within the environment.
NeoEdge Central RDP requires the deployment of a Gateway host to the OT environment. After users are authenticated and authorized through NeoEdge Central, they can access the following through the Gateway host:
- Open a browser to connect to other devices/applications.
- Open a terminal to connect to other devices via SSH Console.
- Open RDP to connect to other operating systems.
- Open the application software on the Gateway host.
4. Support for the Gateway host.
NeoEdge Central RDP supports:
- X86/64 CPU – Ubuntu 22.04 Desktop OS LTS
- X86/64 CPU – Windows 10/11 OS
- X86/64 CPU – Windows Server 2022
Remote operation footprints and audit logs.


5.1 Screen recording.
Once an authorized user starts the remote desktop service, NeoEdge Central activates the screen recording mechanism, capturing every action the user performs. These recordings are securely stored after being encrypted. Administrators can query, replay, and download these operation logs within NeoEdge Central.
5.2 Audit logs
All important activities performed by users after logging into NeoEdge Central are recorded in the Event Log. Administrators can query and export these activity logs within NeoEdge Central.
