温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/cps-remote-access-is-moving-to-operations-ssh
点击访问原文链接

CPS Remote Access Is Moving to Operations | SSH

CPS Remote Access Is Moving to Operations | SSH About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers February 24, 2026 Why CPS Secure Remote Access Is Shifting from Connectivity to Operations Written by: Barbara Hoffman Remote access has become a permanent operational reality for cyber-physical systems (CPS), what was once an occasional maintenance tool is now a foundational capability for operating, maintaining, and supporting industrial and critical infrastructure environments. At the same time, remote access is rapidly becoming one of the most exploited attack vectors into CPS environments.

This tension — between operational necessity and rising risk — is driving a fundamental shift in how organizations approach remote access.

Remote access is now a primary CPS attack vector

We feel Gartner highlights that attackers are increasingly targeting weak or legacy remote access mechanisms such as VPNs, jump servers, and general-purpose IT privileged access tools to gain entry into CPS environments. These tools were not designed for production or safety-critical systems and often provide overly broad network-level access once a user is authenticated.

In its recent report, Market Guide for CPS Secure Remote Access, Gartner makes a clear strategic assumption: by 2029, the percentage of attacks on CPS using remote access vectors will grow from negligible numbers to over 20%.

This marks a dramatic change from the past, when such attacks were considered rare.

This risk is amplified by what Gartner describes as “shadow access” — undocumented or unmanaged remote connections created by OEMs, contractors, or employees. These connections often bypass corporate firewalls and governance processes entirely, leaving security teams with little visibility into who has access, to what systems, and under which conditions.

Why traditional IT tools fail CPS environments It is explicit that traditional IT-centric remote access tools lack the contextual awareness required for CPS environments. While VPNs and IT PAM solutions focus on securing connectivity, CPS environments require protection of operations.

Inappropriate or malicious access to CPS assets can result in physical damage, safety incidents, environmental harm, or operational failure. As a result, we feel, Gartner emphasizes that CPS secure remote access solutions must enforce granular, least-privileged access not just at the network level, but at the device, application, and even command level.

Deploying multiple remote access tools across CPS environments increases complexity and risk. Diverse configurations, inconsistent encryption protocols, and fragmented logging make centralized governance and auditing difficult — precisely when regulatory scrutiny is increasing.

The shift from secure connectivity to secure operations One of the Gartner central observations is that the CPS remote access market is moving decisively from “secure connectivity” toward “secure operations.” This shift is driven by the operational reality of managing complex, distributed environments and the recognition that legacy tools cannot safely support mission-critical systems.

We feel Gartner identifies several capabilities as essential for CPS secure remote access solutions, including identity-centric Zero Trust principles, just-in-time access, elimination of standing privileges, and comprehensive session monitoring and recording. Agentless architectures are also highlighted as critical, given the fragility and longevity of many CPS assets.

Importantly, Gartner emphasizes protocol-aware access. Leading solutions can inspect native industrial protocols and distinguish between safe diagnostic actions and potentially dangerous write commands — blocking unauthorized actions before they impact physical systems.

Regulation and resilience as market accelerators Regulatory pressure is a key external force shaping this market, according to Gartner. Standards and frameworks such as IEC 62443, NIS2, NERC CIP, and NIST SP 800-82 increasingly mandate strong identity verification, granular access controls, and tamper-proof audit trails. Gartner notes that legacy VPN-based approaches struggle to meet these requirements efficiently or consistently.

Beyond compliance, resilience as a growing concern. CPS environments must operate reliably in disrupted, low-bandwidth, or intermittently connected conditions, while maintaining security and auditability. This is pushing organizations toward architectures designed specifically for CPS operational realities rather than adapted from IT environments.

A strategic priority for CPS leaders The message is clear: secure remote access is no longer a tactical IT decision. It is a strategic capability that underpins safety, uptime, compliance, and long-term resilience in CPS environments.

Organizations that continue to rely on legacy remote access approaches risk turning an operational necessity into their most dangerous exposure. Those that adopt purpose-built CPS secure remote access solutions aligned with Zero Trust and operational safety principles will be better positioned to meet today’s threats — and tomorrow’s regulatory and resilience challenges.

Get your complimentary copy of the Gartner® Market Guide for CPS Secure Remote Access. Available for a Limited Time!

Gartner Market Guide for CPS Secure Remote Access, Katell Thielemann, Wam Voster, Sumit Rajput, 3 February 2026

 

GARTNER is a trademark of Gartner, Inc. and/or its affiliates.

Gartner does not endorse any company, vendor, product or service depicted in its publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner publications consist of the opinions of Gartner’s business and technology insights organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this publication, including any warranties of merchantability or fitness for a particular purpose.

Tag(s): Privileged Access Management , PAM , Operational Technology , PrivX OT Barbara Hoffman Product Marketing Manager, PrivX ZT Suite at SSH Communications Security

Other posts you might be interested in Privileged Access Management 6 min read | July 15, 2025 Stronger Standards, Safer Access: The Role of FIPS 140-3 in PAM Read More Privileged Access Management 7 min read | December 23, 2025 From Vaulting to Vision: A Front-Row Look at the Future of PAM  Read More Operational Technology 10 min read | November 18, 2025 Navigating the PAM Landscape according to Info-Tech  Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录