ComfortClick Remote Access Security Features

20. 03. 2024

In the smart building automation sector, secure remote access to your projects is of critical concern. Here you can learn about the methodologies employed by ComfortClick to fortify its Remote Access feature against potential cyber threats utilizing Microsoft Azure for its Cloud Gateway access alongside Peer-to-Peer (P2P) technologies with Datagram Transport Layer Security (DTLS) for Remote KNX programming. This article aims to dissect the security layers that align with the rigorous cybersecurity standards mandated by the EU's NIS2 Directive. Through this examination of these technologies, you will understand how ComfortClick not only ensures the security and reliability of remote access to its systems but also adheres to the evolving landscape of EU cybersecurity legislation.

Cloud Gateway Using Microsoft Azure

Cloud Gateway connection via Microsoft Azure offers a robust foundation for secure remote connections to the ComfortClick main applications. This approach ensures that system integrators and clients enjoy the highest levels of security, leveraging Azure's comprehensive security features.

Key Points:

 

Remote KNX Programming Using P2P and DTLS

For Remote KNX programming, ComfortClick employs a P2P connection enhanced with DTLS security features. This setup provides a direct link from the system integrator's computer to ComfortClick servers located within the project, ensuring end-to-end security.

Key Points:

Conclusion

ComfortClick employs advanced technologies like Microsoft Azure's Cloud Gateway and P2P connections with DTLS encryption to fortify its Remote Access feature. By aligning with EU cybersecurity standards, ComfortClick ensures secure and reliable access to smart building systems all over the world.

Back To News

This website uses cookies

We use cookies to personalize content, use live chat, provide social media features and to analyze our traffic. We also share information about your use of our site with analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services.