Learn More About Netop SecureM2M
Combining high security with an easy-to-use interface, Netop’s M2M solution enables remote control, servicing, and asset monitoring without exposing your systems to the public Internet. Download our support documentation to learn more:
- Netop SecureM2M - Data Sheet
- Netop SecureM2M - Product Whitepaper
- Netop SecureM2M - Getting Started Guide
- Netop SecureM2M - Connector Installation & Configuration Guide
- Netop SecureM2M - Software Gateway Installation & Configuration Guide
- Netop SecureM2M - Hardware Gateway Installation & Configuration Guide
Netop SecureM2M Network Specifications
The Connector is where users - IT and operations teams as well as third-party users - and API calls interact with Secure M2M. It can be installed on the following:
- Windows XP, Vista, 7, 8
- 32-bit and 64-bit
The Software Gateway can be deployed directly on networked servers or devices running the following platforms. In instances where other platforms are in use, the Hardware Gateway (below) can be deployed.
- RedHat Enterprise 5.5, 5.6, 6.0
- Ubuntu 10.4 & 12.04
- SUSE Enterprise 11.1
- OpenSUSE 11.4/12.1
SecureM2M Gateway Hardware
For some environments, installing Netop SecureM2M Gateway software directly to servers or devices is not an option. That's why we created the Netop SecureM2M Hardware Gateway - a ready-to-deploy device that connects to your network through an ethernet port. Ideal for retrofitting legacy devices, our Hardware Gateway brings port-forwarding, IP masking and secure connectivity to any device, anywhere.
- Ethernet Port or Mini USB for USB-to-Ethernet connectivity
- 5 Vdc input wall-wart power supply
- Dimensions: L 4.5” (11.43 cm); W x 4.5” (11.43 cm); H x 1.85” (4.7 cm)
How SecureM2M Works
Netop SecureM2M: How Secure Remote Access Works
- An administrator configures rights to limit user access to specific ports on specific devices.
- The Netop Gateway communicates with Netop Secure Cloud by way of an outbound heartbeat - devices do not need to be exposed to the public Internet and no ports need to be held open.
- A user or API call initiates contact through the Netop Connector to the Netop Secure Cloud.
- A secure, encrypted tunnel is created between the Netop Connector and Netop Gateway to allow data to be pulled, files to be transferred, remote control and other applications to be run on target devices.