cyolo.io Open in urlscan Pro
146.190.13.121  Public Scan

Submitted URL: https://d2pwzf04.na1.hubspotlinks.com/Ctc/RJ+113/d2pWZf04/VWh0808z-rvfW8c9Dcp3KYc3zW74N_GZ5nl-l-MfRflz3m2ndW8wLKSR6lZ3myW4TYP9L8gRXVSW...
Effective URL: https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&_hsenc=p2ANqt...
Submission: On November 14 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7608544/30283b1a-4b0a-4417-9be8-b3e292b0240f

<form id="hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7608544/30283b1a-4b0a-4417-9be8-b3e292b0240f"
  class="hs-form-private hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f hs-form-30283b1a-4b0a-4417-9be8-b3e292b0240f hs-form-30283b1a-4b0a-4417-9be8-b3e292b0240f_c72bce85-f487-4e39-9e2e-f9d18acf2dd2 hs-form stacked hs-custom-style"
  target="target_iframe_30283b1a-4b0a-4417-9be8-b3e292b0240f" data-instance-id="c72bce85-f487-4e39-9e2e-f9d18acf2dd2" data-form-id="30283b1a-4b0a-4417-9be8-b3e292b0240f" data-portal-id="7608544"
  data-test-id="hsForm_30283b1a-4b0a-4417-9be8-b3e292b0240f">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-30283b1a-4b0a-4417-9be8-b3e292b0240f" class="" placeholder="Enter your Email" for="email-30283b1a-4b0a-4417-9be8-b3e292b0240f"><span>Email</span><span
        class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-30283b1a-4b0a-4417-9be8-b3e292b0240f" name="email" required="" placeholder="Type your email..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1731544564764&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1687812716993&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Does Privileged Access Management (PAM) Meet OT Security Needs? | Cyolo&quot;,&quot;pageUrl&quot;:&quot;https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&amp;_hsenc=p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A&amp;_hsmi=333860554&amp;utm_content=333860554&amp;utm_source=hs_email&quot;,&quot;urlParams&quot;:{&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A&quot;,&quot;_hsmi&quot;:&quot;333860554&quot;,&quot;utm_content&quot;:&quot;333860554&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;5025b07fc581849385c7973797548b8c&quot;,&quot;__hsfp&quot;:3377520574,&quot;__hssc&quot;:&quot;23413989.1.1731544565663&quot;,&quot;__hstc&quot;:&quot;23413989.5025b07fc581849385c7973797548b8c.1731544565663.1731544565663.1731544565663.1&quot;,&quot;formTarget&quot;:&quot;#hubspot-form-1&quot;,&quot;rumScriptExecuteTime&quot;:2175.8999996185303,&quot;rumTotalRequestTime&quot;:3248,&quot;rumTotalRenderTime&quot;:3460.8999996185303,&quot;rumServiceResponseTime&quot;:1072.1000003814697,&quot;rumFormRenderTime&quot;:212.89999961853027,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1731544565670,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;7608544&quot;,&quot;formId&quot;:&quot;30283b1a-4b0a-4417-9be8-b3e292b0240f&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hubspot-form-1&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;css&quot;:&quot;&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;c72bce85-f487-4e39-9e2e-f9d18acf2dd2&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1731544564858,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;onFormReady\&quot;,\&quot;onFormSubmitted\&quot;]&quot;},{&quot;clientTimestamp&quot;:1731544564858,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Does Privileged Access Management (PAM) Meet OT Security Needs? | Cyolo\&quot;,\&quot;pageUrl\&quot;:\&quot;https://cyolo.io/blog/does-privileged-access-management-pam-meet-ot-security-needs?utm_medium=email&amp;_hsenc=p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A&amp;_hsmi=333860554&amp;utm_content=333860554&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-9xyUfE3ZxqnHReOg9oOiKRkbTlrW7XlUqIxzJ88yAkarDmeAeowch_Z9e8NTXurcTZomWA362FHMPsqE_Ie4NWLnHG2A\&quot;,\&quot;_hsmi\&quot;:\&quot;333860554\&quot;,\&quot;utm_content\&quot;:\&quot;333860554\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1731544564860,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1731544565667,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;5025b07fc581849385c7973797548b8c\&quot;}&quot;}]}"><iframe
    name="target_iframe_30283b1a-4b0a-4417-9be8-b3e292b0240f" style="display: none;" data-lf-form-tracking-inspected-kn9eq4ryovx7rlvp="true" data-lf-yt-playback-inspected-kn9eq4ryovx7rlvp="true"
    data-lf-vimeo-playback-inspected-kn9eq4ryovx7rlvp="true" data-lf-yt-playback-inspected-belvo73kgwk7zmqj="true" data-lf-vimeo-playback-inspected-belvo73kgwk7zmqj="true"></iframe>
</form>

Text Content

×

We use cookies to improve your website experience and provide more personalized
services to you. To find out more about the cookies we use, see our Privacy
Policy.

Accept
Product

Solutions


BY CHALLENGE


Industrial Remote Privileged Access

Third Party Secure Access

Mass Onboarding Secure Access


BY INDUSTRY


All Industries
Partners

Resources


RESOURCES

See All Resources
Blog

News

Press Releases

Compliance

Third Party Reports

Buyer's Guides

Case Studies

At a Glances

Datasheet

White Papers

Videos

Webinars


FEATURED CONTENT


Press Release

CYOLO REVOLUTIONIZES SECURE REMOTE ACCESS WITH AI-POWERED SUPERVISION

Third Party Report

SANS 2024 STATE OF ICS/OT CYBERSECURITY REPORT

Blog

5 “UNIQUE” SECURITY CHALLENGES FACING OT/ICS ENVIRONMENTS

Third Party Report

2024 GARTNER® HYPE CYCLE™ FOR CYBER-PHYSICAL SYSTEMS SECURITY NAMES CYOLO AS A
SAMPLE VENDOR

Company
About Us
Careers
Support

Toggle Search
Eng

De

Spa

Fre

Ita

Eng De Spa Fre Ita
Get a Demo
Close Menu
Product
Solutions
Industrial Remote Privileged Access Third-Party Secure Access Mass Onboarding
Secure Access All Industries
Partners
Resources
Blog News Press Releases Compliance Third Party Reports Buyer's Guides Case
Studies At a Glances Datasheets White Papers Videos Webinars
Company
About Us Careers
Support Search Toggle Search

Blog
Aug 19, 2024
5 min read


DOES PRIVILEGED ACCESS MANAGEMENT (PAM) MEET OT SECURITY NEEDS?

Written By

JENNIFER TULLMAN-BOTZER




WHAT IS PRIVILEGED ACCESS MANAGEMENT (PAM)?  

Privileged access management (PAM) is a subset of Identity and Access Management
(IAM) that enables organizations to exert control over the elevated
(“privileged”) access and permissions for identities, users, accounts, and
systems across an information technology (IT) environment. By “right-sizing”
privileged access controls, PAM helps organizations minimize their attack
surface and limit the potential damage from external attacks as well as insider
threats.  


KEY PAM CAPABILITIES 

 * Privileged account discovery 

 * Credential vaulting and management 

 * Identity authentication 

 * Least privilege access 

 * Session management 

 * Session recording 

 * Auditing and reporting 


WHY PAM FALLS SHORT IN OT ENVIRONMENTS


1. PAM REQUIRES A SEPARATE SOLUTION TO PROVIDE CONNECTIVITY 

PAM solutions enforce least privilege access and provide important supervisory
controls, such as session recording and auditing. However, a separate solution
is needed to actually connect the user to the desired resource. When PAM is used
in combination with a problematic remote access tool, like a VPN or jump server,
the weaknesses of the access solution are inherited. For VPNs, these weaknesses
include potential security vulnerabilities and the need to download an agent;
for jump servers, they include a significant operational burden and obstacles to
scalability. 

How Cyolo Helps: As an agentless all-in-one remote privileged access solution,
Cyolo PRO (Privileged Remote Operations) ensures security from the initial point
of access through to the termination of the connection. Cyolo PRO is more secure
and efficient than a VPN and offers more operational agility than a jump
server.   


2. PAM IS BUILT FOR IT, NOT OT 

The PAM approach is designed to provide extra security for a relatively small
number of IT admins or other privileged accounts. Common operational technology
(OT) challenges, such as securing third-party access and remote access to
critical infrastructure, are simply outside the scope of even the best PAM
tools.  

In addition, most PAM solutions require a cloud connection, which leaves them
unable to support the on-premises, isolated, and legacy-based systems that tend
to characterize OT environments. Even when a cloud connection is possible, PAM
solutions can impede system responsiveness, introduce friction for
administrators, and cause operational disruptions. These may be relatively minor
inconveniences in an IT context, but they are dealbreakers for OT. 

How Cyolo Helps: Cyolo PRO is purpose-built for the distinctive needs of OT
environments. The solution can be deployed in any environment (cloud-connected,
on-premises, or fully offline) and is designed to accommodate OT priorities like
safety and systems availability. Cyolo PRO can even retrofit legacy systems to
support multi-factor authentication (MFA) with no costly upgrades or
rip-and-replace.  


3. PAM CANNOT SECURE THIRD-PARTY VENDOR ACCESS  

Securing third-party vendor access to critical systems is a key requirement for
many industrial enterprises. Beyond their more general inability to address OT
challenges, PAM tools do not solve this important use case.   

When PAM is used with a VPN, third-party vendors and contractors must download
the VPN onto their device to connect to the organization’s network. Requiring
vendors to install a VPN is impractical, as they may work with dozens of
different companies operating many different VPNs. Managing third-party PAM use
also creates a heavy burden for admins, who face a long, complex process for
onboarding new vendors. This isn’t just inconvenient; it can lead to operational
delays or system downtime when one-time technicians can’t be quickly
credentialed to address an urgent problem.  

How Cyolo Helps: In contrast to PAM, Cyolo PRO is designed to ensure simple and
secure access for third-party vendors to even the most sensitive systems and
resources. The solution is agentless, enabling third parties to easily connect
with no downloads needed. Admins also face less of a burden as they can add new
users to the correct access policies with just a few clicks and no delays.   


4. PAM FACES SCALABILITY CHALLENGES AND INCREASES OPERATIONAL BURDEN 

PAM is intended to provide elevated controls for a limited number of privileged
accounts (typically IT admins or other super users). Expanding PAM use to
additional groups of privileged users, such as third-party vendors or remote
workers, sounds simple but in reality adds significant complexity for already
over-burdened admins. Scaling PAM can also quickly become prohibitively
expensive, especially because VPNs, jump servers or other tools are also needed
to extend connectivity. 

How Cyolo Helps: Cyolo PRO’s unique architecture enables seamless scalability
while simultaneously improving operational agility. Deployment across even
dozens of sites is fast and easy, and admins can set access and actions controls
at both the application and user group levels. Thanks to Cyolo PRO’s
multi-tenancy structure, admins have the option to easily manage, control, and
standardize access and actions policies in multi-site global organizations as
well as smaller ones.  


THE BOTTOM LINE ON PAM

PAM is an important tool for organizations to have in their cybersecurity
arsenal, but it cannot satisfy the distinctive requirements of OT environments
and is insufficient for securing remote privileged access to industrial controls
systems (ICS) and critical infrastructure.   

Unlike traditional PAM solutions, Cyolo PRO  is purpose-built to meet OT/ICS
needs. Cyolo PRO enables organizations in critical industries to safely and
securely connect all types of privileged users, including but not limited to
third-party contractors, OEM vendors and technicians, and badged employees who
remotely manage operations. 

Compared specifically to PAM, Cyolo PRO provides far greater security,
scalability and adaptability. 




DISCOVER THE BENEFITS OF CYOLO PRO (PRIVILEGED REMOTE OPERATIONS)

Watch the video



 

JENNIFER TULLMAN-BOTZER

Author

Jennifer Tullman-Botzer is a cybersecurity nerd by day and a history nerd by
night. She has over a decade of experience in cybersecurity marketing and is as
tired as you are of hackers-in-hoodies stock images. Jennifer joined Cyolo in
2021 and currently serves as Head of Content. Prior to Cyolo, she worked in a
variety of marketing roles at IBM Security. She lives in Tel Aviv, Israel.


SUBSCRIBE TO OUR NEWSLETTER

Email*



More Blog Posts
See All Blog Posts
Blog
Oct 28, 2024

TRANSFORM SESSION MONITORING WITH INTELLIGENT SUPERVISION FOR OT ENVIRONMENTS

Read More
Blog
Oct 1, 2024

5 “UNIQUE” SECURITY CHALLENGES FACING OT/ICS ENVIRONMENTS

Read More
Blog
Sep 17, 2024

HOW TO MODERNIZE SECURE REMOTE ACCESS: VDIS BRING LOW PERFORMANCE AT A HIGH COST

Read More

PRODUCT DEMO


SEE HOW THE CYOLO PRO REMOTE ACCESS SOLUTION WORKS.

Ensuring secure remote access to on-prem, isolated, and cloud-connected OT
environments is easier than you think. See for yourself.

Request a Demo

Deliver seamless secure access to all your assets for all your users – third
party, remote, on-prem – without the fear of introducing cyber risks to your
critical systems.

Get in Touch: +1-866-918-1143



PRODUCT

Product Overview
Industrial Remote Privileged Access
Third Party Secure Access
Mass Onboarding Secure Access
Industries

COMPANY

About Us
Careers
Partners

RESOURCES

Blog
Press Releases
Copyright © 2024 Cyolo LTD. All rights reserved.
Cyolo Privacy Policy Cookie Policy
For YouTrending
Remote Privileged Access Management (RPAM) is Not PAM | Cyolo

Why the IT Security Toolkit Does Not Work for OT | Cyolo

How to Modernize Secure Remote Access: Overcoming the VPN’s Security Shortfalls
| Cyolo
Request a Demo
Recommended For You