top of page

Vernetzen Veto

Secure Remote Access to your Operational Technology (OT) Networks

Vernetzen Veto is purposely designed to allow Network Owner’s to confidently control 3rd party access to IP networks putting cyber-security back in the hands of the Network Owner.

The unique pre-authorisation process ensures networks are only accessible by 3rd parties on a case-by-case basis with the Network  Owner’s prior approval. Furthermore, access is finite in duration as the secure, cloud-based access tunnels are digitally destroyed on timeout or termination. 

Vernetzen Veto is connected to a network which benefits from 3rd-party access. Requirements may be as simple as data collection from store-and-forward applications or as complex as updating the firmware on an automated vehicle- the use cases are practically endless. Once connected, the Vernetzen Veto Portal provides an intuitive user interface for authentication, access requests, control and status monitoring of each Vernetzen Veto.

Network Owners have full oversight and control of remote access without requiring any special IT skills. Access into a network begins with a request initiated by a 3rd party which requires the explicit approval of the Network Owner before a connection can be established.

How does the Vernetzen Veto work?

Veto employs a unique authentication procedure designed to enable the Network Owner to effectively control 3rd-party remote access.

Network Owner simply needs to:

  1. Provide access to the Veto Portal to the 3rd-party (usually a support provider);

  2. Approve the 3rd-party's remote access request; and,

  3. Connect a Veto to the appropriate network segment.



  • Secure, authenticated remote access VPN session to remote networks.

  • Allows secure network troubleshooting with total oversight of Network Owner.

  • Provides efficient troubleshooting method for IT specialists.

  • Allow external Support Providers to troubleshoot equipment issues in an efficient and secure manner.

  • Generic installation requirements with Ethernet and Wi-Fi connectivity; 18-75 V DC power.

  • No need to manage port-forwarding or firewall rulesets.


  • No sharing of credentials. No local user accounts, temporary or otherwise. No VPNs or firewall rule modifications.

  • Decreased time for a support provider to access network.

  • Decreased troubleshooting time and cost.

  • Decreased deployment / update of equipment.

  • Peace of mind with secure 3rd party access.

  • Simplified nature of remote access for all parties.

Allow simple, secure and effective remote access to your network for temporary troubleshooting, configuring or monitoring activities.

bottom of page