Business Wire

CA-CYOLO

21.2.2024 14:31:29 CET | Business Wire | Press release

Share
New Research from Cyolo and Ponemon Institute Identifies Significant Gaps in Securing Access to Connected OT Environments

Today, Cyolo, the access company for the digital enterprise, in partnership with Ponemon Institute, released a global study exploring how organizations that operate critical infrastructure, industrial control systems (ICS), and other operational technology (OT) systems are managing access and risk in an era of rising connectivity.

“Our world has become increasingly interconnected, and the findings of this report highlight the vital need for organizations to reevaluate and enhance their strategies for ensuring secure access into OT environments,” said Larry Ponemon, Chairman and Founder of the Ponemon Institute.

The report, “Managing Access & Risk in the Increasingly Connected Operational Technology (OT) Environment,” reveals that many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to OT systems. The report is based on a survey of 1,056 security professionals across the United States and EMEA who work in organizations that run an OT environment and are knowledgeable about their organization’s approach to managing OT security and risk.

Ensuring secure access to OT environments is about more than just cybersecurity. These environments contain highly sensitive systems and critical infrastructure responsible for keeping manufacturing lines running, water and electricity flowing, and performing other tasks vital to the smooth functioning of our communities.

OT systems were historically isolated for security reasons but are now facing increased connectivity to IT networks and the internet (sometimes called IT/OT convergence). At the same time, more third-party vendors and contractors are being given remote access to OT environments. These shifts introduce serious new risks that can leave organizations exposed to safety and security threats if access and connectivity are not properly controlled.

Overall key findings include:

  • Organizations allow dozens of third-party users to access OT environments. 73% permit third-party access to OT environments, with an average of 77 third parties per organization granted such access. Challenges to securing third-party access include preventing unauthorized access (44%), aligning IT and OT security priorities (43%), and giving users too much privileged access (35 percent).
  • Visibility into industrial assets is dismal. 73% lack an authoritative OT asset inventory, putting organizations at significant risk.
  • IT and OT teams share responsibility for OT security but do not communicate enough to achieve optimal outcomes. 71% report that IT or IT and OT together are responsible for securing OT environments. However, collaboration and communication are lacking, with 37% reporting little or no collaboration, and 19% reporting that teams talk about OT security issues only when an incident occurs.
  • Security is seen not only as a goal of IT/OT convergence but also as an obstacle. Reducing security risk is the top objective of companies pursuing IT/OT convergence (59%), and yet one-third (33%) of organizations not pursuing convergence cite security risk as a top factor for their decision.

“We are at a crucial point in the evolution of OT security, and the need to secure access to critical systems from internal and external threats is more urgent than ever. The stakes are exceptionally high, as a breach could jeopardize not just data but also the functioning of critical infrastructure, risking the safety of workers and the environment,” said Joe O'Donnell, Executive Vice President of Corporate Development and General Manager of OT at Cyolo. “This research reveals a pressing need for new approaches, especially in areas like third-party and privileged access, the security of legacy systems, and collaboration between IT and OT teams. Cyolo is dedicated to supporting organizations in navigating these challenges and working towards a secure, resilient future for OT environments.”

Access the full report here.

Register to attend a joint webinar from Cyolo and Ponemon Institute, on Tuesday, March 12 at 11am ET here: Behind the Ponemon Report: Risk & Access Management in the OT Environment.

During this session Dr. Larry Ponemon will share top insights from the research, with industry analysis added by Cyolo’s Joe O’Donnell and Adi Karisik, Global Principal for OT Cybersecurity at Jacobs Engineering.

About Cyolo

Cyolo enables privileged remote operations by connecting verified identities directly to applications with continuous authorization throughout the connection. Purpose-built for deployment in every type of environment, Cyolo’s Remote Privileged Access Management (RPAM) solution combines multiple security functions required to mitigate high risk access, including zero-trust access for users and devices, MFA for the last mile, IdP capabilities, credentials vault, secure file transfer, supervised access, session recording, and much more into a single, cost-effective, easy to deploy, and user-friendly platform.

Consolidate your security stack and experience the power of seamless and secure operations across any application in any environment, from critical infrastructure to cloud. Visit https://cyolo.io/ to learn more.

About Ponemon Institute

Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. We uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions.

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

View source version on businesswire.com: https://www.businesswire.com/news/home/20240221222283/en/

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com
DK

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Vena To Acquire Acterys, Creating a New Category of Enterprise Performance Management: Orchestrated Planning3.2.2026 17:00:00 CET | Press release

The acquisition unites finance foresight and IT innovation in the first Microsoft-native Orchestrated Planning environment, helping enterprises plan better and achieve more by turning strategy into aligned execution in real time. Vena, the only complete FP&A platform powered by agentic AI and purpose-built to amplify the Microsoft technology ecosystem, today announced it has entered into a definitive agreement to acquire Managility Pty Ltd, operating as Acterys (“Acterys”), the industry’s leading Power BI–based operational planning and app development platform, subject to customary closing conditions and regulatory approval. This acquisition unlocks a category-defining way for enterprises to combine planning, analytics, and application development within the Microsoft tools they already trust to run their business. By combining Vena’s Excel-native financial planning and analysis (FP&A) capabilities with Acterys’ proprietary Power BI write-back engine and unified analytics within Micros

Volante Technologies named a Leader in Gartner® Magic Quadrant™ for Banking Payment Hub Platforms3.2.2026 16:15:00 CET | Press release

Volante believes its solutions provide complete always-on payment processing support for banks and financial institutions across all tiers Volante Technologies, the global leader in Payments as a Service (PaaS), today announced its recognition as a Leader in the 2026 Gartner® Magic Quadrant™ for Banking Payment Hub Platforms, which evaluates vendors based on Ability to Execute and Completeness of Vision. In Volante’s view, Gartner positioned them as a Leader based on their capacity to support enterprise-scale payment processing in banks and financial institutions across multiple regions, deployment models, and operational environments. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260203149834/en/ This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. As the highest positioned provider in Ability to Execute, Volante believes its AI-pow

Toptal Ranked #1 Most Reliable Professional Services Company in America by Newsweek3.2.2026 16:00:00 CET | Press release

Toptal, the world’s largest fully remote workforce, has been ranked the #1 most reliable professional services company in America on the America’s Most Reliable Companies 2026 list by Newsweek and Statista. The list ranks top US companies based on trust, dependability, and consistent performance in their industry. In Newsweek’s ranking of 300 companies across all industries, Toptal took 10th place, right behind Bank of America and Oracle, which tied for 9th. As the most reliable professional services organization in America, Toptal, which ranked 11th in absolute rankings across all companies, placed well ahead of companies like Accenture (33), Deloitte (39), and Cognizant (66). The America’s Most Reliable Companies 2026 ranking is based on an independent survey of more than 80,000 evaluations submitted by 2,400 business decision-makers at America’s largest companies, including Apple, Dropbox, Johnson & Johnson, and UPS, making this recognition an especially meaningful indicator of prod

HTEC Research Reveals the Real AI Scaling Challenge: It’s Not the Technology3.2.2026 15:46:00 CET | Press release

Global executive survey finds AI momentum is real—but leadership alignment, capability gaps, and ROI clarity are slowing enterprise impact AI has moved from ambition to action. Every organization is deploying it. Yet for most enterprises, the real challenge is only just beginning. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260203951136/en/ HTEC, a global AI‑first provider of software and hardware design and engineering services, released Executive Summary: A Cross‑Industry View of the State of AI in 2025, a global research report capturing how senior executives are navigating the next phase of AI transformation—and why scaling value remains elusive. Today, HTEC, a global AI‑first provider of software and hardware design and engineering services, released Executive Summary: A Cross‑Industry View of the State of AI in 2025, a global research report that captures how senior executives are navigating the next phase of AI tra

Yubico Reveals 265% ROI and 99.99% Reduction in Risk of Exposure to Addressable Breach Risk Costs According to Total Economic Impact Study3.2.2026 15:00:00 CET | Press release

Effectiveness of Yubico’s technology: $5.3 million Net Present Value and $7.3 million in total benefits over three years, driven by 80% faster authentication and reduced help desk burden Yubico (NASDAQ STOCKHOLM: YUBICO), a modern cybersecurity company and creator of the most secure passkeys, today announced the results of a commissioned Total Economic Impact™ (TEI) of Yubico YubiKeys study conducted by Forrester Consulting. The study, comprised of interviews with global enterprises with over 5,000 employees, found that a composite organization based on interviewed customers achieved a 265% return on investment (ROI) and a net present value (NPV) of $5.3 million over three years by replacing traditional multi-factor authentication (MFA) and one-time passwords (OTPs) with phishing-resistant YubiKeys. In an era of high-quality deepfakes and generative AI-driven extortion, the study shows a critical shift in cybersecurity: traditional MFA is no longer sufficient to stop modern MFA-bypass

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye