Full network control at any given time

The same pattern repeats itself over and over again: Historically influenced IT landscapes with a variety of different constructs to allow remote "dial in" for support and maintenance activities by the respective product manufacturers. As a result of which, third-party devices are granted access to the network, there is a lack of needs-oriented access approval, and also a lack of monitoring and logging of interventions in critical system environments. – Impossible to have full control over all accesses instances and activities in your own network at all times!