Ponemon Institute Research Report: Managing Access and Risk in the OT Environment -
About Cyolo

Unusually Easy Secure Remote Access for OT

At Cyolo, we make securely connecting privileged users to critical OT assets surprisingly simple. That means bad actors can do a lot less – and your employees and third-party partners can do exactly what they need to do.

Our Mission

Enable secure remote access that drives your business instead of draining your energy

Almog Apirion, our CEO and co-founder, calls himself a ‘recovering CISO.’

In that role, he saw first-hand how difficult it is to wrestle with tools that make remote access complicated, slow, and inconvenient – all in the name of keeping the company secure. This was frustrating, especially because most of the tools he came across didn’t even meet his security standards.

So, instead of settling for what existing solutions could do, Almog set out to create something that did what he wanted them to do:

  • Improve operational agility for admins, supervisors, and operators.

  • Enhance productivity for all users.

  • Keep every session secure from start to finish.

Then he assembled a team of experts and visionaries to turn that wishlist into a reality. And together, they built Cyolo.

Why Cyolo?

We started by asking some difficult questions

Does security have to be so cumbersome?

Or have we just learned to expect nothing better? Sure, workarounds, multiple logins, and clunky tech stacks are normal — but should they be?

Should your vendor force you to migrate to the cloud or make other major infrastructure changes? 

You’ve spent years designing your security stack. You have better things to do than rebuild it just to meet a vendor’s needs. Shouldn’t your remote access solution work with your existing infrastructure, instead of forcing you to rip it all out and start from scratch?

Different users and devices pose different levels of risk. So, why do we treat them all the same?

Privileged accounts typically make up around 10% of users but are responsible for the vast majority of risk. So why not focus on them, instead of wasting resources applying rigid restrictions to everyone?

Does your security vendor really need access to all your secrets?

Handing over your passwords and encryption keys to a vendor only creates another weak link in your security. Shouldn’t your secrets stay secret from everyone – including your vendor?

The world is decentralized. Why aren’t our access solutions?

Your OT systems and operations are distributed across an increasingly wide area. Doesn't it make sense to use a remote access solution that’s similarly decentralized? It's the best way to increase uptime, improve performance, and remove the risk of a single point of compromise.

Facing a difficult challenge helped us build a solution that's easy. And better in every way.

Better productivity

  • One platform, one login, no big changes to your work routine

  • Agentless access to get third-party vendors working fast

  • No more lagging or wheel-spinning 

Better security

  • True zero-trust access limits the risk of a damaging breach 

  • Post-access controls secure the session from start to finish and help meet compliance standards

  • Retrofit legacy systems with modern identity-based authentication

Better agility

  • Decentralized architecture for easy installation and management

  • Deploy in any environment (cloud-connected, on-prem, or offline)

  • Easily scale up or down as needed

It all adds up to a remote access solution that meets the needs — and exceeds the expectations — of both security and OT teams.

Leadership

Our leadership team keeps us on the path to perfection

Almog Apirion

CEO, Co-founder

Dedi Yarkoni

CTO, Co-founder

Eran Shmuely

Chief Architect, Co-founder

Joe O’Donnell

CSO

Yana Melnick

CFO

Jonathan Yellin

VP of R&D

Asa Kedar

VP of Sales, EMEA

Michelle Levy

VP of Marketing

Max Berman

VP of Customer Success

Richard Villasenor

VP of Partner Success

Joe Flowers

VP of Global Alliances and Channel Engineering

Hadas Hermon

VP of People

Case Study

Our customers experience the Cyolo difference every day

Rapac Energy, a leading power plant operator, needed to provide secure access to their OT and SCADA systems for external suppliers, global support teams, and customers. The company previously used a VPN, but access was slow and employees were frustrated. The new solution had to include multiple security features that comply with stringent regulatory and internal requirements.

Now, with Cyolo, Rapac is succeeding to ensure business continuity while also achieving the highest level of security for its critical systems.

“No solution gives me so much control and security like Cyolo. It’s everything I need in one solution.”

- Shlomo Kamilyan, CIO, Rapac Energy 

Investors

Our investors trust us to continuously push the industry forward

Recognized by