Big Data
Cloud Computing
Data Center
Hardware
HR, Finance, Marketing
Internet
IT Management
IT-Security
Mobile
Network
Software
Client: Claroty Pte. Ltd
Format: Whitepaper
Size: 1.62 MB
Language: English
Date: 06.11.2024
OPTIMIZING OT REMOTE ACCESS FOR THIRD-PARTY VENDORS WITH CLAROTY xDOME SECURE ACCESS (SA)
Third parties, such as OEM technicians and maintenance contractors, are key to the availability, integrity, and safety of operational technology (OT) environments. Typically responsible for servicing OT assets, these third parties often work remotely — which means they often connect to their clients’ OT environments remotely via any of the countless, widely used solutions that enable such connectivity. From VPN-based options to OEM-specific tools, most of these types of solutions are rooted in what has long been the status quo for OT remote access: an approach intended not for OT environments but, rather, for their information technology (IT) counterparts.
The problem is — that this status quo is deeply flawed. OT and IT environments, with their distinct compositions, serve various purposes and come with their own set of security and operational needs, challenges, and risks that are notably different. When it comes to third-party OT remote access, these differences are even more pronounced and have significant consequences. Therefore, a unique approach specifically designed for OT is necessary to address the requirements, challenges, and risks associated with third-party OT remote access.
This white paper examines the security and operational challenges and risks associated with using standard, IT-oriented solutions for third-party OT remote access, key requirements for the optimal solution, and how Claroty xDome Secure Access (SA) fulfills those requirements.
The problem is — that this status quo is deeply flawed. OT and IT environments, with their distinct compositions, serve various purposes and come with their own set of security and operational needs, challenges, and risks that are notably different. When it comes to third-party OT remote access, these differences are even more pronounced and have significant consequences. Therefore, a unique approach specifically designed for OT is necessary to address the requirements, challenges, and risks associated with third-party OT remote access.
This white paper examines the security and operational challenges and risks associated with using standard, IT-oriented solutions for third-party OT remote access, key requirements for the optimal solution, and how Claroty xDome Secure Access (SA) fulfills those requirements.