In the past 5 years there has been a mass proliferation of remote access to OT Networks. This has come about due to remote workers needing to maintain business continuity. Remote users typically connect to high value assets within the network, so are prized targets for adversaries and ransomware.
Remote users have typically gained access via a VPN and in some cases a MFA prompt. VPNs operate on the principle of trust: your connection to the remote site is confidential, but you have access to all devices on the remote network. This typical deployment contradicts the principle of Zero Trust.
At Defend OT we operate on a risk-based approach
Physical-layer Remote Access Control
Can you ensure the safety of your most vulnerable assets while still allowing access? By utilizing a physical-layer approach to control remote access, you can guarantee their protection.
Application Isolated Access
For maximum Availability in OT networks, you should only access the applications you’re permitted to access – this prevents you, or an adversary, from accessing sensitive equipment and causing an Availability outage.
Zero Trust Remote Access
ZTRA protects OT environments by providing a secure remote access solution designed for third-party contractors and remote employees. ZTRA offers security features such as secure remote access, privileged credential management, session monitoring, web-based antivirus scanning, and a secure file manager. These features reduce cybersecurity risks from remote users, both internal and external to the organization.