Report
Organizations have far too many remote access solutions deployed within OT environments, creating excessive risk and operational burdens.
In this Team82 report, we reveal that enterprises are meeting the demand for remote access to operational technology environments with an excessive deployment of tools—upwards of 16 in some cases. While it’s not unusual to see more than one remote access tool in an enterprise (for IT and OT), such sprawl expands the attack surface available to threat actors, and adds a significant operational burden to manage and secure these tools.
The phenomenon of remote access tool sprawl is a byproduct of connectivity of once air-gapped systems and network segments, and the urgency to converge OT and IT security management. In this report, you’ll learn:
The scale of remote access tool sprawl inside some companies and the startling percentage of those with anywhere between four and 16 separate tools running simultaneously
How many organizations are deploying enterprise-grade secure remote access, and those others instead relying on VPNs and other remote maintenance tools common in IT environments
The operational burden and risky exposures created by these excessive deployments, including a lack of centralized management, and poor policy enforcement.
Please complete the form to view the Report.