Benefits
-
No SSH, No vulnerable open port
-
Replayable sessions, auditable logs
-
Rapid debugging and diagnostics
Built for Device Developers and Operators
- Embedded Linux device operators
- Integrators and operators managing connected fleets
- Product teams monitoring performance or troubleshooting devices
- Support teams troubleshooting customer devices
Robust IoT Device Access
- Secure Connection
- Role-Based Access Control
- Fully Audited Access
-
- Session Recording and Reply
- End-to-End Encryption
- Zero Trust Architecture
- High-Performance Protocol
- Zero Config
- Remote terminal in your browser
Frequently Asked Questions
Here are answers to common questions. If you need more information, please get in touch.
-
Does IoT Device Access use SSH to remotely connect?
No, Boldwark IoT Device Access uses a proprietary tunnel to access your devices in a performant and secure way. This allows you to make sure your device has no open port for SSH access, hence limiting the potential attack surface.
Our proprietary tunnel is fully encrypted and optimized for low data usage during your session.
-
Can I replay and audit sessions afterwards?
Yes, Boldwark IoT Device Access keeps a log of your sessions to be replayed and audited to enhance your organizational security and keep track of each interaction with your devices in the field.
-
Does IoT Device Access require an agent?
Yes. The Boldwark agent needs to be embedded in your device firmware.
-
How is my remote session secured?
Boldwark IoT Device Access secures your session by making sure all communication is fully encrypted.