|
By Xona
COMMENTARY: When the United States and Israel launched coordinated strikes against Iran on February 28, the security community mobilized around the visible response. I’ve watched that response for two weeks: teams tracking hacktivist DDoS campaigns, incident counts climbing, news coverage following close behind.
|
By Xona
Remote access into OT and ICS environments has always carried risk. But the nature of that risk has changed. Threat detections now happen in seconds. Sensors identify anomalous behavior in real time. Identity platforms continuously evaluate trust. SIEM and OT security tools generate rich, contextual alerts instantly. Yet in most environments, access enforcement is still manual. A detection triggers a ticket. A human reviews. A decision is made. Minutes—or hours—pass before action is taken.
|
By Xona
TL;DR Xona Platform v5.5 strengthens remote access across distributed OT environments. It introduces session resilience to maintain continuity during network interruptions, expands centralized governance for more consistent access control, and enhances support for constrained or disconnected deployments. In critical infrastructure environments, remote access is not abstract. It supports maintenance windows, emergency response, vendor coordination, and day-to-day operations across distributed sites.
|
By Xona
Secure remote access (SRA) is no longer a stopgap or an IT workaround; it’s become foundational to industrial cybersecurity. According to KuppingerCole, demand for SRA in OT and ICS environments is accelerating due to the convergence of IT and OT networks, rising cyber threats, and mounting regulatory pressure. Traditionally, remote access in industrial environments was limited, heavily manual, and often avoided due to risk.
|
By Cody Jaster
Security incidents and service disruptions are never simple. They are rarely the result of a single mistake, and they don’t only happen to organizations that “did something wrong.” In reality, many of the most capable, well-resourced companies experience them precisely because they operate at scale, under constant pressure, and within complex, interconnected environments.
|
By Roark Pollock
Remote access has become essential. However, for most industrial organizations, it’s also become the most dangerous blind spot in their cybersecurity posture. The tools many teams still rely on VPNs, jump servers, and shared logins that were never built for today’s OT and IT environments. These legacy systems were designed decades ago, when connectivity was simpler and threats were fewer.
|
By Raed Albuliwi
Remote access isn’t optional in critical infrastructure anymore; it’s operationally essential. Whether for maintenance, OEM support, remote field work, or incident response, industrial organizations must enable access to critical systems. But, legacy access methods like VPNs, jump servers, and even agent-based Zero Trust or IT-based remote privileged access management (RPAM) tools all share one dangerous flaw: they implicitly trust the endpoint.
|
By Cody Jaster
Cyberattacks on operational technology systems increased 87% in 2024 (Dragos 2024), with endpoint access emerging as THE top attack vector for OT and industrial control systems (ICS). This means the same connections vital to maintaining your critical systems, whether a vendor connecting remotely via VPN or an employee logging into a local workstation, represent a potential entry point into your environment.
|
By Roark Pollock
In today’s connected OT, ICS and CPS world, critical infrastructure organizations have a need to extend remote access to employees, 3rd party contractors, and OEMs. But in the rush to support remote operations, many critical infrastructure operators have exposed their critical systems to a silent but severe risk: the user endpoint.
|
By Roark Pollock
Xona, the leading provider of secure access solutions for critical infrastructure, is excited to announce a strategic partnership with Oregon Systems, a premier cybersecurity value added distributor specializing in Operational Technology (OT), Critical Infrastructure Security and providing High performance computing (HPC) solutions in the Middle East.
- April 2026 (1)
- March 2026 (1)
- February 2026 (2)
- January 2026 (1)
- November 2025 (2)
- September 2025 (1)
- June 2025 (1)
- April 2025 (1)
- March 2025 (3)
- February 2025 (2)
- September 2024 (1)
- April 2023 (1)
- October 2022 (1)
- July 2022 (1)
- April 2022 (2)
- March 2022 (1)
- February 2022 (2)
- January 2022 (1)
- December 2021 (1)
- August 2021 (1)
- May 2021 (1)
- April 2021 (1)
- January 2021 (2)
- February 2020 (1)
XONA is the frictionless user access platform purpose-built for critical infrastructure. Its proprietary protocol isolation and granular controls deploy in minutes, immediately eliminating traditional attack vectors while providing authorized users full and secure control of their operational technology from anywhere. XONA is headquartered in Annapolis, MD and operates its research and development team in Ann Arbor, MI.
Xona Technology:
- Critical System Gateway: Xona Critical System Gateway (CSG) is a browser-based, hardened platform that uses protocol isolation and encrypted display to securely deliver access to any industrial system or application. Xona reduces the attack surface and risk of data loss and prevents unwanted intrusions by securely streaming applications into a standard web browser. Xona architecture is built from the ground up with hardened components.
- ROAM: The Xona Remote Operations Access Manager (ROAM) provides centralized administrative control over remote site gateways (CSGs). ROAM provides a simple dashboard view of all CSGs online and offline, as well as CSG-managed and trusted system connection by each isolated protocol session.
Comprehensive User Visibility and Access Control to Industrial Control Systems.