Create a secure and encrypted TCP/IP connection to your target endpoint from your Vault
When starting a tunnel, a local port is opened up on the local device running Keeper Desktop client. Native applications will communicate to the target from this local port. This is done by:
The Desktop Vault Client communicating with the Keeper Gateway with the relevant connection info through a secure tunnel
The Keeper Gateway then establishes a secure, encrypted TCP/IP connection to the target IP/Port found on the PAM Record
Opening a local port on the local device running Keeper Desktop Client
Native applications will connect to this local port to communicate with the target IP/Port
A common challenge faced by IT Admins, DevOps and development teams is providing remote employees or contractors with access to internal company resources without exposing those resources to external networks. Additionally, remote employees may want to use their desired native applications to access these resources.
Keeper Tunnels solves the above solutions by:
Providing secure, encrypted connection from client to target resource
Allowing users to securely connect to target resource with the native application of choice
Simplifying Configuration - streamline setup and management of secure connection from PAM Record types
Access controls and compliance - centralized management of access controls, ensuring that all connections meet organizational security policies and compliance requirements
Loading...