Back To Top
Fortinet For Secure Remote Access (SRA)

See and Protect Everything from Code to Cloud

FortiSRA ensures secure remote access for users on untrusted networks connecting to trusted networks. It offers features such as credential management, live session monitoring and recording, secure file transfers, and data leak protection. Without requiring an endpoint agent, FortiSRA allows administrators to safeguard employee and third-party access to OT systems, including SCADA, DCS, and IACS.

FortiSRA: Secure Remote Access for OT

video fortisra secure remote access for ot


FortiSRA: Secure Remote Access for OT

As OT networks evolve, the way users access and manage critical OT systems is changing. However, remote access comes with significant risks and management complexities, demanding an OT-specific solution. Watch the video to discover how FortiSRA provides secure access for OT organizations, offering granular control and complete visibility over all users.

Protection Beyond the Network

FortiSRA safeguards OT environments with a secure remote access solution tailored for third-party contractors and remote employees. It delivers advanced security features, including secure remote access, privileged credential management, session monitoring, web-based antivirus scanning, and a secure file manager. These capabilities effectively mitigate cybersecurity risks posed by both internal and external remote users.

Fortinet For Secure Remote Access (SRA)

Specs

Secret Folder
Folder Permission Control Personal Folder Public Folder Secret Policy Management
Secret Template and Access
Custom Template / Template - Cisco Device/ Template - FortiGate
Secret
AD Target Restriction /Approval Request / Associated Secret Launcher /Associated Secret Password Changer / Auto Password Delivery on Native Launcher /Block RDP Clipboard /Cisco Device Auto /Enable on Native Launcher /Favorite Secrets Move/Clone a Secret /Password Heartbeat /Periodical Password Changer /RDP Security Level /Renew Secret Check-out /Secret Check-out/Check-in /Secret Permission /Control /SSH Filter /SSH Keyboard/ Interactive Authentication on Native
Launcher
Web Launcher / Web RDP / Web SFTP /Web SMB /Web SSH /Web VNC
Secret Request Approval
Approval Profile (up to 3 Tiers) / Multiple Approvals /Requirement /Request Notification /Request Review and Approve/ Script
Password Changer
Custom Password/ Changer /Password Policy
Monitor and Record
Active Sessions Monitor /Session Recording /User Monitor
Log and Audit
Events - High Availability /Events - System /Events - User /Logs - Secrets /Logs - Video (Record and Replay)
System
Automatic Configuration Backup /Disaster Recovery support/ Glass Breaking /High Availability /Maintenance Mode /Max /Duration for the Launcher Session/ vTPM: KVM /vTPM: VMWare /Specifications /Data/ Sheet
Authentication
Address (Used in AD Target Restriction) /Scheme and Rules
Stability
Long Session /Stress Test (Overload, CPU 70%)
Installation
Installation Doc/ Administration / Guide /Upgrade
Security
Advanced RDP authentication protocol including / CredSSP, TLS/Anti-Virus /scanning for web-based file transfer (Web SFTP, Web Samba) and SCP-based file transfer /Automatic blocking of privileged commands with SSH filtering profile /Auto password changing after check-in / Data Leak Prevention based on file types, size, or

Features

  • Agentless Secure Remote Access.
  • Secrets and Credential Management.
  • Session Monitoring and Recording.
  • High availability.
  • Web-Based Antivirus.
  • Data Leak Prevention.