Ensure top-tier security when working with apps on IoT devices. Devices protected by a firewall remain safeguarded from unauthorized access. By leveraging tunneling, you guarantee high levels of security, keeping your connected devices safe.
Users control access to application user interfaces on their devices. With the right privileges, users easily enable tunnels to individual apps on their devices. App developers provide the necessary configuration with the IronFlock platform in their apps. Once a tunnel is enabled, users access the web interface on the app directly through the IronFlock tunnel system.
vpn_lock
Tunnel Web, VPN, VNC, Video
The IronFlock tunnel system provides tunnelling support for the protocols HTTP, HTTPS, TCP and UDP. Based on these protocols, you can use Web Interfaces, VPN connections, VNC Remote Desktop, stream videos and many more. The app developers choose the right setup in their apps so that users don't have to.
videocam
Real-time Video
Apps provide WebRTC with STUN and TURN servers for real-time video streaming. This is especially useful for computer vision applications.
manage_accounts
User Authorisation
Each tunnel is automatically secured by the IronFlock privilege system through a dedicated authentication proxy. Only users with use-privileges on a device can access tunnels to apps on the device. Users with tunnel control privileges can additionally make a tunnel public.
This is how it works.
leak_add
Rendevous Service in the Cloud
The IronFlock agent on the device establishes a secure outgoing connection to the IronFlock rendezvous server for a specific application. From your local laptop, you can easily connect to the rendezvous server using a client, such as a browser. The server then seamlessly bridges the connection between your device and the laptop. With just a click on the app icon, users can initiate a secure remote access connection effortlessly.
article
Audit Logs
The IronFlock platform automatically tracks all user interactions on all devices for your internal compliance requirements. This includes the activation and deactivation of tunnels by device administrators. Additionally, the usage of each tunnel will also be tracked so you always know who accessed your devices when.
info
Security
All connections from the device are outgoing, so no ports on the device are exposed to the internet. Many app developers may not offer managed certificate systems for web apps on their devices. IronFlock's tunneling service remedies this by automatically providing HTTPS access to HTTP endpoints on your devices.