cyolo.io
Open in
urlscan Pro
146.190.13.121
Public Scan
Submitted URL: https://d2pwzf04.na1.hubspotlinks.com/Ctc/RJ+113/d2pWZf04/VWh0808z-rvfW8c9Dcp3KYc3zW74N_GZ5nl-l-MfRflz3m2ndW8wLKSR6lZ3myW4TYP9L8gRXVSW...
Effective URL: https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&_hsenc=p2ANqt...
Submission: On November 14 via api from US — Scanned from DE
Effective URL: https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&_hsenc=p2ANqt...
Submission: On November 14 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7608544/30283b1a-4b0a-4417-9be8-b3e292b0240f
<form id="hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7608544/30283b1a-4b0a-4417-9be8-b3e292b0240f"
class="hs-form-private hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f hs-form-30283b1a-4b0a-4417-9be8-b3e292b0240f hs-form-30283b1a-4b0a-4417-9be8-b3e292b0240f_c72bce85-f487-4e39-9e2e-f9d18acf2dd2 hs-form stacked hs-custom-style"
target="target_iframe_30283b1a-4b0a-4417-9be8-b3e292b0240f" data-instance-id="c72bce85-f487-4e39-9e2e-f9d18acf2dd2" data-form-id="30283b1a-4b0a-4417-9be8-b3e292b0240f" data-portal-id="7608544"
data-test-id="hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-30283b1a-4b0a-4417-9be8-b3e292b0240f" class="" placeholder="Enter your Email" for="email-30283b1a-4b0a-4417-9be8-b3e292b0240f"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-30283b1a-4b0a-4417-9be8-b3e292b0240f" name="email" required="" placeholder="Type your email..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1731544564764","formDefinitionUpdatedAt":"1687812716993","lang":"en","embedType":"REGULAR","userAgent":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36","pageTitle":"Does Privileged Access Management (PAM) Meet OT Security Needs? | Cyolo","pageUrl":"https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&_hsenc=p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A&_hsmi=333860554&utm_content=333860554&utm_source=hs_email","urlParams":{"utm_medium":"email","_hsenc":"p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A","_hsmi":"333860554","utm_content":"333860554","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"5025b07fc581849385c7973797548b8c","__hsfp":3377520574,"__hssc":"23413989.1.1731544565663","__hstc":"23413989.5025b07fc581849385c7973797548b8c.1731544565663.1731544565663.1731544565663.1","formTarget":"#hubspot-form-1","rumScriptExecuteTime":2175.8999996185303,"rumTotalRequestTime":3248,"rumTotalRenderTime":3460.8999996185303,"rumServiceResponseTime":1072.1000003814697,"rumFormRenderTime":212.89999961853027,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1731544565670,"originalEmbedContext":{"portalId":"7608544","formId":"30283b1a-4b0a-4417-9be8-b3e292b0240f","region":"na1","target":"#hubspot-form-1","isBuilder":false,"isTestPage":false,"isPreview":false,"css":"","isMobileResponsive":true},"correlationId":"c72bce85-f487-4e39-9e2e-f9d18acf2dd2","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.6227","sourceName":"forms-embed","sourceVersion":"1.6227","sourceVersionMajor":"1","sourceVersionMinor":"6227","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1731544564858,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"onFormReady\",\"onFormSubmitted\"]"},{"clientTimestamp":1731544564858,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Does Privileged Access Management (PAM) Meet OT Security Needs? | Cyolo\",\"pageUrl\":\"https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&_hsenc=p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A&_hsmi=333860554&utm_content=333860554&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsenc\":\"p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A\",\"_hsmi\":\"333860554\",\"utm_content\":\"333860554\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1731544564860,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1731544565667,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"5025b07fc581849385c7973797548b8c\"}"}]}"><iframe
name="target_iframe_30283b1a-4b0a-4417-9be8-b3e292b0240f" style="display: none;" data-lf-form-tracking-inspected-kn9eq4ryovx7rlvp="true" data-lf-yt-playback-inspected-kn9eq4ryovx7rlvp="true"
data-lf-vimeo-playback-inspected-kn9eq4ryovx7rlvp="true" data-lf-yt-playback-inspected-belvo73kgwk7zmqj="true" data-lf-vimeo-playback-inspected-belvo73kgwk7zmqj="true"></iframe>
</form>
Text Content
× We use cookies to improve your website experience and provide more personalized services to you. To find out more about the cookies we use, see our Privacy Policy. Accept Product Solutions BY CHALLENGE Industrial Remote Privileged Access Third Party Secure Access Mass Onboarding Secure Access BY INDUSTRY All Industries Partners Resources RESOURCES See All Resources Blog News Press Releases Compliance Third Party Reports Buyer's Guides Case Studies At a Glances Datasheet White Papers Videos Webinars FEATURED CONTENT Press Release CYOLO REVOLUTIONIZES SECURE REMOTE ACCESS WITH AI-POWERED SUPERVISION Third Party Report SANS 2024 STATE OF ICS/OT CYBERSECURITY REPORT Blog 5 “UNIQUE” SECURITY CHALLENGES FACING OT/ICS ENVIRONMENTS Third Party Report 2024 GARTNER® HYPE CYCLE™ FOR CYBER-PHYSICAL SYSTEMS SECURITY NAMES CYOLO AS A SAMPLE VENDOR Company About Us Careers Support Toggle Search Eng De Spa Fre Ita Eng De Spa Fre Ita Get a Demo Close Menu Product Solutions Industrial Remote Privileged Access Third-Party Secure Access Mass Onboarding Secure Access All Industries Partners Resources Blog News Press Releases Compliance Third Party Reports Buyer's Guides Case Studies At a Glances Datasheets White Papers Videos Webinars Company About Us Careers Support Search Toggle Search Blog Aug 19, 2024 5 min read DOES PRIVILEGED ACCESS MANAGEMENT (PAM) MEET OT SECURITY NEEDS? Written By JENNIFER TULLMAN-BOTZER WHAT IS PRIVILEGED ACCESS MANAGEMENT (PAM)? Privileged access management (PAM) is a subset of Identity and Access Management (IAM) that enables organizations to exert control over the elevated (“privileged”) access and permissions for identities, users, accounts, and systems across an information technology (IT) environment. By “right-sizing” privileged access controls, PAM helps organizations minimize their attack surface and limit the potential damage from external attacks as well as insider threats. KEY PAM CAPABILITIES * Privileged account discovery * Credential vaulting and management * Identity authentication * Least privilege access * Session management * Session recording * Auditing and reporting WHY PAM FALLS SHORT IN OT ENVIRONMENTS 1. PAM REQUIRES A SEPARATE SOLUTION TO PROVIDE CONNECTIVITY PAM solutions enforce least privilege access and provide important supervisory controls, such as session recording and auditing. However, a separate solution is needed to actually connect the user to the desired resource. When PAM is used in combination with a problematic remote access tool, like a VPN or jump server, the weaknesses of the access solution are inherited. For VPNs, these weaknesses include potential security vulnerabilities and the need to download an agent; for jump servers, they include a significant operational burden and obstacles to scalability. How Cyolo Helps: As an agentless all-in-one remote privileged access solution, Cyolo PRO (Privileged Remote Operations) ensures security from the initial point of access through to the termination of the connection. Cyolo PRO is more secure and efficient than a VPN and offers more operational agility than a jump server. 2. PAM IS BUILT FOR IT, NOT OT The PAM approach is designed to provide extra security for a relatively small number of IT admins or other privileged accounts. Common operational technology (OT) challenges, such as securing third-party access and remote access to critical infrastructure, are simply outside the scope of even the best PAM tools. In addition, most PAM solutions require a cloud connection, which leaves them unable to support the on-premises, isolated, and legacy-based systems that tend to characterize OT environments. Even when a cloud connection is possible, PAM solutions can impede system responsiveness, introduce friction for administrators, and cause operational disruptions. These may be relatively minor inconveniences in an IT context, but they are dealbreakers for OT. How Cyolo Helps: Cyolo PRO is purpose-built for the distinctive needs of OT environments. The solution can be deployed in any environment (cloud-connected, on-premises, or fully offline) and is designed to accommodate OT priorities like safety and systems availability. Cyolo PRO can even retrofit legacy systems to support multi-factor authentication (MFA) with no costly upgrades or rip-and-replace. 3. PAM CANNOT SECURE THIRD-PARTY VENDOR ACCESS Securing third-party vendor access to critical systems is a key requirement for many industrial enterprises. Beyond their more general inability to address OT challenges, PAM tools do not solve this important use case. When PAM is used with a VPN, third-party vendors and contractors must download the VPN onto their device to connect to the organization’s network. Requiring vendors to install a VPN is impractical, as they may work with dozens of different companies operating many different VPNs. Managing third-party PAM use also creates a heavy burden for admins, who face a long, complex process for onboarding new vendors. This isn’t just inconvenient; it can lead to operational delays or system downtime when one-time technicians can’t be quickly credentialed to address an urgent problem. How Cyolo Helps: In contrast to PAM, Cyolo PRO is designed to ensure simple and secure access for third-party vendors to even the most sensitive systems and resources. The solution is agentless, enabling third parties to easily connect with no downloads needed. Admins also face less of a burden as they can add new users to the correct access policies with just a few clicks and no delays. 4. PAM FACES SCALABILITY CHALLENGES AND INCREASES OPERATIONAL BURDEN PAM is intended to provide elevated controls for a limited number of privileged accounts (typically IT admins or other super users). Expanding PAM use to additional groups of privileged users, such as third-party vendors or remote workers, sounds simple but in reality adds significant complexity for already over-burdened admins. Scaling PAM can also quickly become prohibitively expensive, especially because VPNs, jump servers or other tools are also needed to extend connectivity. How Cyolo Helps: Cyolo PRO’s unique architecture enables seamless scalability while simultaneously improving operational agility. Deployment across even dozens of sites is fast and easy, and admins can set access and actions controls at both the application and user group levels. Thanks to Cyolo PRO’s multi-tenancy structure, admins have the option to easily manage, control, and standardize access and actions policies in multi-site global organizations as well as smaller ones. THE BOTTOM LINE ON PAM PAM is an important tool for organizations to have in their cybersecurity arsenal, but it cannot satisfy the distinctive requirements of OT environments and is insufficient for securing remote privileged access to industrial controls systems (ICS) and critical infrastructure. Unlike traditional PAM solutions, Cyolo PRO is purpose-built to meet OT/ICS needs. Cyolo PRO enables organizations in critical industries to safely and securely connect all types of privileged users, including but not limited to third-party contractors, OEM vendors and technicians, and badged employees who remotely manage operations. Compared specifically to PAM, Cyolo PRO provides far greater security, scalability and adaptability. DISCOVER THE BENEFITS OF CYOLO PRO (PRIVILEGED REMOTE OPERATIONS) Watch the video JENNIFER TULLMAN-BOTZER Author Jennifer Tullman-Botzer is a cybersecurity nerd by day and a history nerd by night. She has over a decade of experience in cybersecurity marketing and is as tired as you are of hackers-in-hoodies stock images. Jennifer joined Cyolo in 2021 and currently serves as Head of Content. Prior to Cyolo, she worked in a variety of marketing roles at IBM Security. She lives in Tel Aviv, Israel. SUBSCRIBE TO OUR NEWSLETTER Email* More Blog Posts See All Blog Posts Blog Oct 28, 2024 TRANSFORM SESSION MONITORING WITH INTELLIGENT SUPERVISION FOR OT ENVIRONMENTS Read More Blog Oct 1, 2024 5 “UNIQUE” SECURITY CHALLENGES FACING OT/ICS ENVIRONMENTS Read More Blog Sep 17, 2024 HOW TO MODERNIZE SECURE REMOTE ACCESS: VDIS BRING LOW PERFORMANCE AT A HIGH COST Read More PRODUCT DEMO SEE HOW THE CYOLO PRO REMOTE ACCESS SOLUTION WORKS. Ensuring secure remote access to on-prem, isolated, and cloud-connected OT environments is easier than you think. See for yourself. Request a Demo Deliver seamless secure access to all your assets for all your users – third party, remote, on-prem – without the fear of introducing cyber risks to your critical systems. Get in Touch: +1-866-918-1143 PRODUCT Product Overview Industrial Remote Privileged Access Third Party Secure Access Mass Onboarding Secure Access Industries COMPANY About Us Careers Partners RESOURCES Blog Press Releases Copyright © 2024 Cyolo LTD. All rights reserved. Cyolo Privacy Policy Cookie Policy For YouTrending Remote Privileged Access Management (RPAM) is Not PAM | Cyolo Why the IT Security Toolkit Does Not Work for OT | Cyolo How to Modernize Secure Remote Access: Overcoming the VPN’s Security Shortfalls | Cyolo Request a Demo Recommended For You