Zero Trust

Secure Remote Access for Critical Assets

Lock down employees, third-party, OEM, and contractor remote access to individual devices and applications.

Protect the Industrial Environment with Next Generation Remote Access

Zero Trust Remote Access
Verify and validate all users, devices, and applications before establishing remote access to the approved resources.
Microtunnels
Dull's remote access establishes a singular microtunnel which is provisioned just-in-time and only carries an individual application through an mTLS tunnel.
Microsegmentation
Secure remote access to an individual application, isolated from any other services and the IT/OT network.
Ephemeral Virtual Machines
Securely launch remote connections to applications in disposable and non-persistent Virtual Machines.

Remove the need for Complex Networking, VPNs, and Jumpboxes and connect quickly and securely with Dull

Connecting users to individual devices and applications without exposing the IT/OT network to cyber risks.

Create, manage and control remote access for employees, OEMs, vendors, and contractors locked down to an individual device or application.
Authenticate the users remote access journey at every level with layered Multi-factor Authentication.
Prohibit users from moving laterally across the network and seeing all other systems and services within the industrial environment.
Never expose third party users to the IT/OT network or the device's username and password with Dull's least privileged access approach.
builtProtectBg

Secure remote access
built to protect critical assets

Future-proofing your cyber security

  • Securing all connection types and protocols

    Secure anything, anywhere, anytime with Dull

    Dull's innovative design enables Dull to be protocol agonistic. This enables Dull to work with any TCP/IP communication with ease, allowing organisations to simplify and standard all remote connections and device to device communications with Dull.

  • Visibility & Auditability of all Connections

    Understanding every remote connection with your network

    Gain complete visibility of all remote connections made by any employee or third party with detailed data around the user, device, IP addresses, PID, MFA device and more, with the ability to feed these insights into your SOC/NOC of choice.

  • Session Recording with Eavesdropping

    Monitoring and record any remote access session

    Jump in a monitor any live remote connection taking place within the network with ability to watch any recording in the future to understand what occurred on each remote connection.

  • Ephermeral Virtual Machines

    Securely launch remote access session in line with your SOE

    Provision remote access to fully isolated and non-persistent virtual machines while enabling the IT/OT departments to meet the precisive standard operating environment for their security requirements.

  • Secure Credential Launching

    Seamlessly launch remote connections without credentials

    Use any secure secrets manager and provide frictionless and credential-less remote access for any user. Simplifying third-party password management and credential rotation across 1000s of unique usernames and passwords.

  • Moving Target Defence

    Become unpredictable to the outside threat

    Add the additional layer of confusion to the threat actors attempting to gain access to your critical systems with randomised IP and Port number for each and every single remote connection establish into of the network.

User-side & service-side multi-factor authentication for mission critical systems

Establishing greater security, control and context for site and asset owners

  • Authenticate all users
    Ensure that all remote access request require single or dual authentication.
  • Asset owner control
    Enable the asset owner to approve their MFA challenge before any connection can be established into the network.
  • Establish context
    Understanding what you are authenticating and approving into the network.
  • Seamless rejection
    Reject any remote connection that shouldn't be made into the network by an employee or third-party user.

Versatile hosting for every OT environment

Dull’s versatile design allows the Dull Platform to be hosted within your public cloud, private cloud, or on-premise - enabling better flexibility and control.

Public-cloud
Private-cloud
On-premise
Solving significant remote access challenges in critical infrastructure
solvingSignificant0

Water and wastewater

Secure remote access to modern and legacy devices.
Quickly connect to any asset across any location.
Authenticate all users before remote access is established.
solvingSignificant1

Energy

Isolate third party OEMs, vendors, and contractors to individual applications.
Protect mission-critical services with user-side and service-side MFA.
Provision remote network access just-in-time to reduce the available window to target critical systems.
solvingSignificant2

Mining

Secure and protect autonomous software with multi-layered MFA.
Isolate critical on-site applications with software-defined microsegmentation to abolish lateral movement.
Maintain visibility and control of all remote connections.
Moving-GradientMoving-Gradient-Large

Talk to an expert

Secure remote access to managed devices, systems and applications

Contact us
Request demo
About you
Your company
Location
Your message
I agree to the Terms and Conditions