TroutTrout
Industrial Remote Access

Vendor Access Without the Risk

Protocol-aware remote access with per-session policies, live session recording, and no VPN tunnel to your production network.

Trusted by leading companies

John CockerillOrange CyberdefenseElna MagneticsThales
FD
Florian Doumenc
Quality tests - Repository
172.31.112.100
PermissionAllowedwithTLSVPN
Advanced
TLS required
VPN allowed
No Access Form required
http_method
POST
Save
Benefits at a Glance

Remote Access Built for Industrial Environments

The Trout Access Gate replaces VPNs and jump servers with protocol-aware remote access — designed for OT, legacy systems, and regulated environments.

No VPN Tunnels

Vendors connect through the Access Gate, not into your network. No lateral movement, no flat network exposure.

Protocol Inspection

HTTP, SSH, RDP, Modbus — every protocol is inspected and filtered at the application layer before reaching the target.

Session Recording

Every remote session is captured, indexed, and replayable. Full audit trail for compliance and incident response.

Per-Session Policies

Define access by user, resource, protocol, time window, and HTTP method. Every session is individually authorized.

Access Agreements

Require vendors to acknowledge security policies before every session. Logged and timestamped for compliance.

No Agent Required

Works through the browser. Vendors don't install software. IT doesn't manage endpoints they don't own.

Remote Access in Action

Secure Vendor Access. Zero Lateral Movement.

No VPN Required

Traditional VPNs give vendors a tunnel straight into your flat network. The Access Gate provides protocol-aware proxying with per-session policies, live recording, and automatic session termination. See how it works.

Next: Zero-Trust Access

Protocol-Aware Proxying

The Access Gate understands HTTP, SSH, RDP, Modbus, and industrial protocols. Every session is inspected and filtered at the application layer.

Per-Session Policies

Define exactly what each vendor can access — down to the protocol, method, and time window.

USERRESOURCEPROTOCOLSTATUSV1SSHV2HTTPV3ModbusV4RDP

Session Recording

Every remote session is recorded and indexed. Full replay for audits, incidents, and compliance evidence.

SESSION RECORDINGS14m 22s8m 05s2m 41s22m 10s11m 38s5m 17s
The Trout Access Gate gave us a clear path to CMMC compliance without disrupting our manufacturing operations.
D
Director of IT
Defense Contractor, Elna Magnetics

See it in action

Schedule a live demo to see how the Trout Access Gate replaces VPNs with protocol-aware remote access.

Datasheet

Download the Access Gate Datasheet.

Get the complete product overview with technical capabilities, deployment model, compliance alignment, and customer references.

Done

What's Inside

Product architecture, deployment model, key capabilities (proxy enforcement, micro-DMZs, identity-based access), compliance alignment, and real-world customer deployments.

4 pages

See It in Action

Request a live demo to see how the Access Gate deploys on your network without rewiring or downtime.

FAQ

Questions and Answers

0

VPN tunnels into your production network. The Access Gate proxies sessions at the application layer — vendors never touch your internal network.

Vendors open a browser and authenticate through the Access Gate. The Gate proxies their session to the target resource at the application layer. They never get an IP address on your network and can only interact with the specific resource and protocol you've authorized.

The Access Gate supports HTTP/HTTPS, SSH, RDP, VNC, Modbus TCP, and OPC-UA out of the box. Each protocol is inspected at the application layer — for example, you can allow SSH but block specific commands, or allow HTTP GET but deny POST.

Yes. Access rules support time-based constraints — you can allow a vendor to connect only during a scheduled maintenance window. Sessions are automatically terminated when the window closes.

Every remote session is recorded at the protocol level. SSH sessions capture terminal I/O, RDP sessions capture screen activity, and HTTP sessions log all requests. Recordings are indexed, searchable, and replayable for audits and incident response.

Yes. The Access Gate runs entirely on-premise with no cloud dependency. All session proxying, recording, and policy enforcement happens locally. It's designed for ITAR, CMMC, and air-gapped environments.