Increased connectivity, automation, and other Industry 4.0 advances are helping industrial organizations to improve business operations and efficiency. But legacy Secure Remote Access (SRA) tools are unable to provide the level of security, visibility, and control that companies in critical industries need to protect their assets from an expanded attack surface and evolving threats.
This groundbreaking set of AI-powered capabilities will simplify the supervision process while enhancing security and operational efficiency.
Most Secure Remote Access (SRA) solutions are designed either for the cloud or for isolation, and deployment is often a complex, lengthy process. Cyolo PRO, by contrast, is a lightweight, docker-based software solution built on a unique decentralized architecture that enables maximum deployment flexibility. A single solution that provides secure remote access to on-prem, offline environments, or cloud-connected environments, Cyolo PRO accommodates the varied, evolving needs of the modern industrial enterprise.
The legacy systems present in many OT environments typically cannot support modern security protocols and best practices, leaving them highly vulnerable to cyberthreats. With no infrastructure changes needed, Cyolo PRO brings modern, identity-based authentication (including MFA), authorization, credentials vaulting and password rotation, and supervision to these legacy systems – including but not limited to EoL/EoS Windows and Linux and dated PLCs and HMIs. Achieve identity modernization at the lowest cost of change.
Cyolo PRO offers a wide range of granular controls to help admins seamlessly manage what users can and cannot do during a session. Policies are set per application or user and include parameters such as time and geo-location. Additional supervisory controls include Just-in-Time (JIT) access, supervised access, session recording, and more. Take back control and achieve regulatory compliance in the process.
Third-party collaborations help keep operations running smoothly, but vendors and other external users may be hesitant to download agents onto their personal devices. As an agentless solution with no downloads required, Cyolo PRO makes it easy to extend secure remote access to third parties, who can begin working immediately from a web browser or locally installed applications such as RDP, SSH, TIA Portal, FactoryTalk, and Studio 5000.
Another benefit of Cyolo PRO’s architecture is that it enables multi-tenancy, which means a single instance of software can serve multiple client organizations (tenants), with each tenant having its own isolated data and configurations. In practice, this allows organizations not just to easily deploy and manage access across numerous global sites but also to choose between centralized management or site-based local control in accordance with their specific security requirements. Multi-tenancy is especially valuable for supporting OEM needs.
Cyolo PRO adheres fully to the zero-trust security framework and the principle of least privilege. Verified users and devices receive access only to the applications and assets they need and never to the full network. In addition, Cyolo PRO’s decentralized architecture allows customers to keep all credentials, keys, policies, and other secrets inside their trusted boundaries at all times. Sensitive data is never stored or processed beyond the trusted boundaries, giving customers total control and eliminating a potential supply chain risk. Even Cyolo PRO’s cloud deployment model uses the cloud only to route data and never to store or process it.
Cyolo PRO is composed of two distinct components: the IDAC (ID Access Controller) and a Gateway. The IDAC serves as the “brain,” while the Gateway can be placed either on-prem or on-cloud, depending on the organization’s needs.
With its decentralized architecture and lightweight, Docker-based deployment, Cyolo PRO is able to seamlessly adapt to any existing infrastructure. This flexibility allows organizations to mitigate security risks while also improving operational agility and enhancing user experience – all at the lowest cost of change and the lowest total costs of ownership.
Cyolo PRO also integrates smoothly with other security solutions, including any identity provider (IdP), security information and event management (SIEM), security orchestration and response (SOAR), IT service management (ITSM) platform, and more.
A leading power plant operator, Rapac Energy, needed to provide secure access to their OT and SCADA systems to external suppliers, global support teams, and customers. The company previously used a virtual private network (VPN), but access was slow, usage was bulky, and employees were frustrated. The new solution had to provide multiple security features that comply with stringent regulatory and internal requirements.
Rapac Energy looked to Cyolo to solve these security challenges. The entire implementation process took only one day — the shortest implementation Rapac Energy had ever experienced.
“No solution gives me so much control and security like Cyolo. It’s everything I need in one solution.”
- Shlomo Kamilyan, CIO, Rapac Energy