Big Data
Computación en la Nube
Centro de Datos
Hardware
RRHH, Finanzas, Marketing
Internet
Gestión de TI
Seguridad de TI
Móvil
Red
Software
Cliente: Claroty Pte. Ltd
Formato: Whitepaper
Tamaño: 1,62 MB
Idioma: Inglés
Fecha: 06.11.2024
OPTIMIZING OT REMOTE ACCESS FOR THIRD-PARTY VENDORS WITH CLAROTY xDOME SECURE ACCESS (SA)
Third parties, such as OEM technicians and maintenance contractors, are key to the availability, integrity, and safety of operational technology (OT) environments. Typically responsible for servicing OT assets, these third parties often work remotely — which means they often connect to their clients’ OT environments remotely via any of the countless, widely used solutions that enable such connectivity. From VPN-based options to OEM-specific tools, most of these types of solutions are rooted in what has long been the status quo for OT remote access: an approach intended not for OT environments but, rather, for their information technology (IT) counterparts.
The problem is — that this status quo is deeply flawed. OT and IT environments, with their distinct compositions, serve various purposes and come with their own set of security and operational needs, challenges, and risks that are notably different. When it comes to third-party OT remote access, these differences are even more pronounced and have significant consequences. Therefore, a unique approach specifically designed for OT is necessary to address the requirements, challenges, and risks associated with third-party OT remote access.
This white paper examines the security and operational challenges and risks associated with using standard, IT-oriented solutions for third-party OT remote access, key requirements for the optimal solution, and how Claroty xDome Secure Access (SA) fulfills those requirements.
The problem is — that this status quo is deeply flawed. OT and IT environments, with their distinct compositions, serve various purposes and come with their own set of security and operational needs, challenges, and risks that are notably different. When it comes to third-party OT remote access, these differences are even more pronounced and have significant consequences. Therefore, a unique approach specifically designed for OT is necessary to address the requirements, challenges, and risks associated with third-party OT remote access.
This white paper examines the security and operational challenges and risks associated with using standard, IT-oriented solutions for third-party OT remote access, key requirements for the optimal solution, and how Claroty xDome Secure Access (SA) fulfills those requirements.