Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Over Half (55%) Of OT Environments Contain Four Or More Remote Access Tools
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Media Releases > Over Half (55%) Of OT Environments Contain Four Or More Remote Access Tools
Media Releases

Over Half (55%) Of OT Environments Contain Four Or More Remote Access Tools

New Research from Claroty’s Team82 finds organisations looking to increase efficiency are creating excessive cybersecurity risks and operational burdens. 55% of OT Environments Contain Four or More Remote Access Tools (RATs), Greatly Expanding Attack Surface and Operational Complexity. It also found 79% of organisations have more than two non-enterprise-grade tools installed.

Austech Media
Last updated: September 18, 2024 8:23 pm
Austech Media
Share
SHARE

Claroty, the cyber-physical systems (CPS) protection company, recently released new research from Team82 on remote access tool sprawl and the risk exposures it introduces to operational technology (OT) environments.

Data from more than 50,000 remote-access-enabled devices showed that the volume of remote access tools deployed is excessive, with 55% of organisations having four or more and 33% having six or more.

Team82’s research also found that a staggering 79% of organisations have more than two non-enterprise-grade tools installed on OT network devices.

These tools lack basic privileged access management capabilities such as session recording, auditing, role-based access controls, and even basic security features such as multi-factor authentication (MFA).

The consequence of utilising these types of tools is increased, high-risk exposures and additional operational costs from managing a multitude of solutions.

“Since the onset of the pandemic, organisations have been increasingly turning to remote access solutions to more efficiently manage their employees and third-party vendors, but while remote access is a necessity of this new reality, it has simultaneously created a security and operational dilemma,” said Tal Laufer, VP Products, Secure Access at Claroty.

“While it makes sense for an organisation to have remote access tools for IT services and for OT remote access, it does not justify the tool sprawl inside the sensitive OT network that we have identified in our study, which leads to increased risk and operational complexity.” he said.

While many of the remote access solutions found in OT networks may be used for IT-specific purposes, their existence within industrial environments can potentially create critical exposure and compounding security concerns.

According to Gartner®, security and risk management (SRM) leaders should, “perform a full inventory of all remote connections across the entire organisation, as shadow remote access likely exists throughout operational networks, particularly at field sites,” and “remove older remote access solutions when deploying newer CPS secure remote access solutions.

Organisations commonly deploy new solutions without focusing on what is left behind, and with the number of exploited VPN vulnerabilities growing, this could be a significant blind spot.

Claroty’s xDome Secure Access provides organisations with built-for-OT remote operations capabilities and OT-aware security architecture, delivering comprehensive visibility into both OT devices and the users connecting to them.

The solution can now be deployed either on-premise or in the cloud, enabling organisations to optimise remote access management and reduce their total cost of ownership.

Recognising that no two CPS environments are identical, xDome Secure Access provides flexible, operations-specific remote access regardless of an organisation’s geographic spread, network architecture, or cloud maturity, all while enabling regulatory compliance with frameworks such as NIST and NIS2.

About Claroty

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure.

The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection

By Austech Media
Austech Media is Australian press release distribution and publishing organisation dedicated to the technology industry. Incorporating distribution of technology news and events
Previous Article Content creation platforms leveraged for phishing attacks Phishing Attacks Exploit Content Creation Platforms
Next Article Lumify Group Named Employer of Choice in the Australian Business Awards Lumify Group Named Employer Of Choice In The Australian Business Awards
Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

55%) of OT Environments Contain Four or More Remote Access Tools

Tech Articles

Content creation platforms leveraged for phishing attacks

Phishing Attacks Exploit Content Creation Platforms

Content creation platforms are being leveraged for phishing attacks. Its…

September 17, 2024
IT managed services Australia

The Rise Of Managed IT Services In Australia

As we stand at the crossroads of technological advancement and…

October 14, 2024
Role of Medical Robots Australia

Medical Robots Revolutionising Healthcare In Australia (2024)

Australia has seen a rise in the adoption of medical…

November 19, 2024

Recent News

Flower-app-photo
Media Releases

Introducing PictureThis – A botanist in your pocket!

2 Min Read
Avast Logo Tech News
Media Releases

Avast’s Online Protection and Secure Browser Products Win Latest Anti-Phishing Comparison Test

3 Min Read
Rapid7 Releases 2024 Attack Intelligence Report
Media Releases

Rapid7 2024 Attack Intelligence Report Sheds Light On Cyber Threats

5 Min Read
SME Business
Media Releases

PAC Tech Start-up raises US$3 million in Pre-Series A funding round

3 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account