KEBA RemoteConnectivity
Secure remote access
to any machine - worldwide & in a few seconds
KEBA RemoteConnectivity is an easy-to-use, high-performing, plug-and-play digital solution for remote machine access through an IEC62443-compliant secure connection.
The combination of robust hardware, innovative software, and our reliable servers provide a solid basis for any technological need. The offering has the following benefits:
- reduces machine downtime & maintenance costs
- decreases the risk of cyberattacks
- enables a platform for your digitalization services.
Current challenges
& your opportunities with KEBA RemoteConnectivity
Machine downtime
KEBA RemoteConnectivity provides effective problem-solving solution to reduce machine downtime costs.
Onsite service & inspections require time, energy, travel costs & experts availability
We connect your engineers and technical experts with your machine fleet worldwide quickly and at no cost.
Constantly evolving new machine security regulations for OEMs
Our solution helps you to stay up-to-date with the latest EU security regulations like the EU Cyber Resilience Act (CRA), which prohibits EU-market access to non-complying devices & to keep yourself present in the EU market.
Remote access solution from KEBA vs. developing an own one
With our user-friendly & turnkey secure access solution, you save yourself time and stay open to possible integration of upcoming KEBA features.
Three pillars of the solution
& their main specifications
SiteManager
- Industrial IoT gateways – secure and IEC62443 certified
- SiteManager 15x9 – hardware solution WAN / WIFI / 4G
- SiteManager Embedded – Kemro X integrated software solution
GateManager
- 2 KEBA servers for quick coverage worldwide
- Server locations in Hong Kong for Asia and in Denmark for Europe & America
- Manage connections & keep customer‘s infrastructure private
LinkManager
- Client software for service technicians & OEM specialists
- Connect to your customer machine – wherever you are in any private network
Security features at a glance
- End-to-end encryption
- Access restricted to specific IP endpoints (and not the entire network)
- Ability to grant access to a specific person to a specific device at a specific time interval
- User authentication compliant with corporate IT policies (integration with active directory, MFA, etc.)
- Two-factor authentication
- Audit trails
- Role-based account management
- Certified according to IEC62443
Downloads
Thank you for your request. Our KEBA Customer Support will get in touch with you soon.
Locations
Business Areas
Newsroom
Edge
Chrome
Safari
Firefox