Products > Bastion host
Security
Bastion host

Transparent, centralised access control for robust protection of your infrastructure

Benefits of bastion

Reinforcing your security

The bastion host provides a secure, central point of entry for accessing the sensitive resources of your infrastructure. The equipment and services managed via the bastion host are not exposed to the Internet, which protects them from brute force attacks and malware port scans.

Centralise access management

The bastion host can be reached directly from Cloud Temple's console. It provides secure RDP or SSH connectivity to your physical and virtual infrastructures, whether they are located in the trusted cloud, in a public cloud or on premise.

Managing infrastructure - as code

APIs are used to manage Cloud Temple's bastion host entirely "as Code", enabling equipment to be added, connected, modified and deleted.

Increase traceability

Each access session via the bastion host is recorded, providing full traceability of actions taken for audit and compliance purposes

Technical
specifications

Encryption
of streams

Recording sessions
Systematic and unstoppable

Protocol
RDP, SSH

Traceability
Log of all actions

Administration
Up to 50 pieces of equipment per appliance

Pricing

BASTION - Appliance Bastion Cloud Temple SSH & RDP - Recording H264 - 50 IPs 1 appliances 276,00 € 1 month
Cloud temple enterprise photo Openshift PaaS
Use cases

Remote access management

The Bastion host security solution acts as a secure gateway to your infrastructures, via a single reinforced access point. You can manage access authorisations and limit entry points to your systems, reducing the risk of intrusion.

Cloud temple enterprise photo programme editor Trusted Cloud Accelerator
Use cases

Protection against cyber-attacks

By using bastion, you create an extra layer of defence to protect your sensitive data from cyber-attacks. No public IP address is required: using bastion allows you to open a more secure RDP/SSH connection using a private IP address.

Cloud temple enterprise photo audit consulting
Use cases

Creating external access to your organisation

You can offer temporary, controlled access to your suppliers and partners while continuously monitoring security, directly from thevCloud Temple's console. Log generation provides full traceability for audit and compliance purposes.

Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.