The world needs critical infrastructure to survive. To ensure the continuous operations of these essential systems and processes, industrial enterprises must provide secure access for a wide range of users. Interruptions are not an option, and any security or access solution that risks downtime is, simply put, a no go.
Much of Cyolo's recent development efforts have focused on improving both security and user experience for our clients in the industrial space. Cyolo 4.3 (available now!) expands on some key capabilities to add even more layers of security and make the product easier than ever to use for administrators as well as end users.
In many cases, access from inside of critical infrastructure requires the use of a physical token to validate identity. This is one step of the multi-factor authentication (MFA) process for each user and lowers the risk of a compromised identity being used to gain access. With a physical token, the user presents a specific device (other than their mobile) that generates a code which is then used to validate the user before access is granted.
Another regular occurrence in critical infrastructure is the need to transfer files, which could be new process configurations or software updates. Ensuring that files are free from malware is a cybersecurity best practice but scanning files inside of an OT/ICS environment is exceedingly difficult.
One frequent problem our customers solve with the Cyolo solution is controlling the access of external users, such as third-party technicians or vendors, to their environments. This proves especially valuable when our clients do not want to add these users to their existing corporate active directories. Onboarding external users into the Cyolo platform needs to be quick and painless for the admin and the end user alike.
Continuing the theme of easy onboarding, when groups of users are created in the existing corporate Identity Provider (IdP), Cyolo can import and use those groups in the enforcement of policy across the Cyolo solution. Now, when a new user is added to an existing group, or when a new group is created, Cyolo will use System for Cross-Domain Identity Management (SCIM) to import or update the group.
As we continue to innovate and further improve the Cyolo zero-trust access solution, our focus will remain on creating the best possible user experience and advancing new layers of security for all our current and future clients.
You can learn more about the new capabilities included in Cyolo 4.3 by watching our product release webinar.
Samuel is the Director of Product Marketing at Cyolo. Before cybersecurity, he spent 7 years working in the ER and loves to tell stories. He is the husband to one, father to four, lives in Bozeman, MT, and would rather be outside. He holds an M.A. in Strategic Leadership from Life Pacific University.