Use Cases – Remote Access
Remote Access Use Cases
Enabling secure, credential-free remote access to servers is critical for modern privileged access management. 12PortRemote Access delivers zero trust, agentless session management with broad protocol support, comprehensive auditing, MFA, approval workflows, and seamless user identity integration, providing robust protection and visibility for your server infrastructure.
Secure and Auditable Server Console Access Without Credential Exposure
Remote access to critical servers is one of the highest-risk operations in any IT environment. Allowing authorized users to connect to server consoles without revealing or sharing credentials is essential to reduce attack surfaces and enforce security policies. 12Port Remote Access enables secure, zero trust remote session access that is fully auditable, providing peace of mind while maintaining IT efficiency.
Flexible Protocol Support for Zero Trust Access
Users can access servers through a variety of protocols, including web-based RDP, SSH, VNC, Telnet, and IBM i terminals, all delivered via a secure browser interface. Native client application access is also supported for RDP and SSH, offering the flexibility organizations need across diverse infrastructure. The platform supports multiple credential types such as username/password and private keys, including PEM, OpenSSH, and PuTTY formats with robust cryptographic algorithms like RSA, EcDSA, and Ed25519 to ensure secure authentication without exposing secrets.
Agentless Gateway Architecture for Security and Scalability
At the core of the solution is an agentless remote access gateway that serves as a secure single point of entry. This design eliminates the need for endpoint agents, simplifies deployment, and enforces microsegmentation principles by isolating network segments. This architecture supports complex, isolated networks through load balancing and peer node configurations, enabling secure and scalable remote session access across the enterprise.
Comprehensive Auditing and Session Recording
Every privileged session is tracked with precise event reporting that ties user activity to specific servers, ensuring a full audit trail for compliance and forensic analysis. Sessions are video recorded in their entirety, and administrators have the option to enable recording of file transfers, clipboard usage, and keyboard input to increase visibility and detect unauthorized actions.
Granular Access Controls with MFA and Approval Workflows
At the core of the solution is an agentless remote access gateway that serves as a secure single point of entry. This design eliminates the need for endpoint agents, simplifies deployment, and enforces microsegmentation principles by isolating network segments. This architecture supports complex, isolated networks through load balancing and peer node configurations, enabling secure and scalable remote session access across the enterprise.
Seamless Enterprise Identity Integration
Every privileged session is tracked with precise event reporting that ties user activity to specific servers, ensuring a full audit trail for compliance and forensic analysis. Sessions are video recorded in their entirety, and administrators have the option to enable recording of file transfers, clipboard usage, and keyboard input to increase visibility and detect unauthorized actions.
Why Secure Remote Session Access Matters
Managing privileged remote session access with zero trust and strong governance minimizes the risks associated with credential exposure and insider threats. Organizations gain continuous visibility and control over sensitive server connections, enabling compliance with security standards while protecting critical assets from unauthorized use.