TroutTrout

Secure Remote Access for OEM Vendors.

OEM vendors and contractors need access to your machines. An open VPN into your production network is not the answer. On-premise bastion host. MFA-enforced. Session-scoped. Fully logged.

Core Capabilities

Replace VPN with Controlled Access.

Five capabilities that replace risky open VPN tunnels with session-scoped, MFA-enforced remote access — all on-premise, fully auditable.

On-Premise Bastion Host

Purpose-built remote access gateway deployed in your facility. OEM vendors connect through the bastion — never directly into your production network. Zero cloud exposure.

MFA Before Every Session

Multi-factor authentication enforced before any vendor session begins. Works with your existing identity provider or standalone MFA. No exceptions, no bypass.

Full Session Recording

Every vendor session recorded — screen activity, commands executed, files transferred. Playback-ready for incident investigation and compliance audit.

Machine-Scoped Access

Each vendor sees only the specific machines they're authorized to maintain. No lateral movement into the broader factory network. Access expires automatically when the session ends.

No VPN Into Production

Replace open VPN tunnels that expose your entire OT network. The Access Gate creates time-limited, scoped connections — closing automatically when maintenance is complete.

Trusted by manufacturers across the supply chain.

Elna Magnetics
100%

on-site CUI data flows, from engineering designs to production plans, aligned with CMMC Level 2 compliance.

Read case study

Trusted by leading companies

Thales
Orange Cyberdefense
Carahsoft
Millbrook Machine
Elna Magnetics
NeverHack
The Trout Access Gate gave us a clear path to CMMC compliance without disrupting our manufacturing operations.
D
Director of IT
Defense Contractor, Elna Magnetics

Ready to get started?

Talk to our team to see how the Trout Access Gate fits your environment.

Datasheet

Download the Access Gate Datasheet.

Get the complete product overview including the on-premise bastion host architecture, MFA enforcement, session recording, and CMMC alignment.

Done

What's Inside

Remote access architecture, on-premise bastion host, MFA enforcement, session recording, CMMC Level 2 and NIS2 compliance alignment.

4 pages

See It in Action

Request a live demo to see how vendor access works through the Access Gate bastion — secure, scoped, and fully logged.

Request a Demo
FAQ

Common Questions About Secure Remote Maintenance.

0

open VPN tunnels into your production network. The Access Gate replaces persistent VPN with session-scoped, time-limited access.

VPNs grant broad, persistent network access — once a vendor is connected, they can often reach systems far beyond what's needed for maintenance. The Access Gate scopes each session to specific machines, enforces MFA, records all activity, and closes access automatically when the session ends.

Yes. The Access Gate acts as a controlled gateway — vendors connect to the bastion host from anywhere, authenticate with MFA, and get scoped access to only the authorized equipment. The production network itself is never directly exposed.

Every vendor session is recorded — screen activity, commands, files transferred. Recordings are stored on-premise under your control. They're immediately accessible for incident investigation, and can be provided for compliance audits and CMMC assessments.

Sessions expire automatically at a configured time limit or when the vendor disconnects. No persistent access remains. Each new maintenance event requires fresh authentication and re-authorization — no standing access.

Yes. The Access Gate supports concurrent vendor sessions with independent policies per vendor, machine, and time window. Each vendor sees only their authorized equipment — no cross-vendor visibility.