Patented Technology

Dull's Zero Trust Remote Access

Cyber hardened remote access developed for critical devices and applications.

Protecting mission-critical systems with cutting-edge technology

Why Dull?

VPNs & Jumpboxes were never built to provide secure access
to OT environments

1

Creating remote network access without the right tools can be challenging and presents cyber risks, especially across many users, devices, and sites.

2

The utilization of traditional VPNs, Gateways, Jump Servers, and complex firewall rules not only makes it difficult to manage the network, but it also opens up the network to potential cyber threats.

Why Dull?
Insecure Jumpboxes serves and gateways
Shared credentials
Virtual private networks
Complex firewall rules
How we do it?

Dull secures, protects & microsegments critical OT networks with application-level remote access

1

Dull’s innovative solution enables organisations to simply and securely create, manage and control remote access across any users, asset and location with ease.

2

Dull's Zero Trust approach streamlines your remote access security with granular access policies, multi-layered MFA, session recording, ephemeral virtual machines, and more, to lock down critical IT & OT assets.

How we do it?
Remote access Microsegmentation
Multi-layered MFA
Moving target defense
Secured credential launching

Remove the need for Complex Networking, VPNs,
and Jumpboxes and connect quickly and securely with Dull

Empower your organisation with Dull

Title
Icon
Secure any user
Employees
OEMs
Vendors
Contractors
Government
Icon
Access any asset
VMs
Cloud
OT
SCADA
ICS
PLCs
RTUs
Icon
Protect any location
Factory office
Power stations
Pumping stations
Remote sites

Secure remote access for all connection types

Securely connect any user to application or any device-to-device communication within the IT/OT network.

User to Application
Device to device
  • Create, manage and control remote access for employees, vendors, and third-parties down to the individual application.
  • Never expose third party users to the IT/OT network or the device's username and password with Dull's least privileged access approach.
  • Authenticate the users remote access journey at every level with layered Multi-factor Authentication.
  • Prohibit users from moving laterally across the network and seeing all other systems and services within the industrial environment.
  • Secure device-to-device communication with end-to-end encryption and Zero Trust.
  • Secure legacy and SCADA devices without having to change the network configuration or replace the device itself.
  • Secure insecure protocols such as Telnet with Dull's Zero Trust Secure Remote Access.
  • Secure and connect the communications between industrial PC's, RTU's, PLC's with zero trust and software-defined controls.
  • Microsegment the communication between industrial devices within the network with device-level networking.

Simplified
third-party
remote access management

Connecting users to individual devices and applications without exposing the IT/OT network to cyber risks.

Lockdown every user
Provide third party technicians with individual remote connections rather than access to a VPN, Jumpbox or Workstation.
Isolate every connection
Isolate each remote connection to an individual TCP/IP address.
Log every interaction
Document every detail of the remote access journey with comprehensive logging and session recording.

Versatile hosting for every OT environment

Dull’s versatile design allows the Dull Platform to be hosted within your public cloud, private cloud, or on-premise - enabling better flexibility and control.

Public-cloud
Private-cloud
On-premise

Cyber security features
of the Dull Platform

Icon

Isolated Remote Access

Lockdown remote access sessions to an individual device, service or application with end-to-end encryption and just-in-time network access.

Icon

Multi-layered MFA

Enforcing multi-factor authentication on users, devices and critical services running on site, by adding layered MFA across mission critical services.

Icon

Moving Target Defense

Randomise the IP address and Port number for each remote connection, making it impossible to predict what IP and Port number will be used to connect to the destination service.

Icon

Ephemeral Virtual Machines

Provision remote access to fully isolated and non-persistent virtual machines that enable the operational environment to meet the precisive operational requirements of a customer.

Icon

Session Recording

Capture the full remote access session within a secure and non-invasive operating system locked down to the particular device, service or application.

Icon

Session Shadowing

Jump into any live remote access session and observe every interaction the users are performing to the destination service with the ability to terminate active session.

Icon

Secure Credential Launching

Centrally manage your IT/OT devices and applications without revealing the username or password to the end user.

Icon

Full Connection Logs

Understanding who was accessing what and when with detailed session logging of the user's initiating device, MFA device, IP address, the PID, subsequent network session, admin authentication and more.

Icon

SOC/NOC Integrations

Use Dull a part of your security operations to build a comprehensive approach to analyse, detect and response to any cyber security incident.

Solving significant remote access challenges in critical infrastructure
solvingSignificant0

Water and wastewater

Secure remote access to modern and legacy devices.
Quickly connect to any asset across any location.
Authenticate all users before remote access is established.
solvingSignificant1

Energy

Isolate third party OEMs, vendors, and contractors to individual applications.
Protect mission-critical services with user-side and service-side MFA.
Provision remote network access just-in-time to reduce the available window to target critical systems.
solvingSignificant2

Mining

Secure and protect autonomous software with multi-layered MFA.
Isolate critical on-site applications with software-defined microsegmentation to abolish lateral movement.
Maintain visibility and control of all remote connections.
Moving-GradientMoving-Gradient-Large

Talk to an expert

Secure remote access to managed devices, systems and applications

Contact us
Request demo
About you
Your company
Location
Your message
I agree to the Terms and Conditions