A recent report from Cyolo reveals that secure remote access is no longer just a cybersecurity measure but a key enabler of business growth in the manufacturing sector. The study found that 67 percent of manufacturers identified improved third-party collaboration as the top benefit of secure remote access. Additionally, 58 percent cited increased operational efficiency, and 50 percent reported significant cost savings.
The findings challenge the traditional view that cybersecurity hinders productivity. Instead, the research shows that secure remote access is creating measurable value, with leaders across the industry viewing it as a catalyst for operational efficiency and business growth.
Titled “Can Cybersecurity Drive Growth? The Strategic Role of Secure Remote Access in Manufacturing,” the report highlights the growing importance of secure remote access as manufacturers embrace Industry 4.0. As digitalization, connectivity, and AI adoption accelerate, secure remote access has become essential for driving operational improvements and sustaining competitive advantage.
The survey, conducted by Takepoint Research on behalf of Cyolo, gathered insights from 535 qualified respondents, including CISOs, CIOs, OT security leads, and plant engineers across North America and EMEA.
Almog Apirion, CEO and co-founder of Cyolo, emphasized that the report shows how global manufacturers are beginning to see cybersecurity as a business enabler. “When implemented correctly, secure remote access can drive faster innovation, improved uptime, and greater productivity. In short, better cybersecurity means a bigger bottom line,” he said.
AI Adoption and Third-Party Access
The report reveals that AI adoption is growing rapidly in the manufacturing sector. Over 96 percent of respondents plan to integrate AI into their remote access security strategies, with anticipated benefits such as improved real-time threat detection (61 percent), enhanced compliance (47 percent), and proactive risk identification (38 percent).
Third-party access is also widespread, with 88 percent of manufacturers granting remote access to external parties, including vendors, contractors, and suppliers. However, only 54 percent extend these privileges to internal employees, creating significant security risks if not properly managed.
Cybersecurity Practices in OT Environments
The study also shows that traditional IT security practices are making their way into operational technology (OT) environments. 69 percent of respondents have implemented multi-factor authentication (MFA), while 34 percent are adopting zero-trust strategies. These security measures reflect a shift toward modern frameworks better suited for today’s complex OT environments.
Regulatory compliance continues to be a strong driver for secure remote access adoption, particularly in Europe. The survey found that 30 percent of respondents in EMEA cited compliance requirements as a primary factor in adopting secure remote access, compared to just 19 percent in North America.
Despite the growing adoption of secure remote access, many respondents expressed dissatisfaction with their current solutions. 42 percent rated their current remote access measures as ineffective in protecting OT environments, and the average user experience satisfaction score was just 2.5 out of 5.
Key Priorities for Manufacturers
To fully realize the benefits of secure remote access, the Cyolo report identifies five key priorities for manufacturers:
- Position Secure Remote Access as a Core Business Enabler: Make secure remote access central to driving uptime, agility, and innovation.
- Focus on Usability and Adoption: Design intuitive, user-friendly interfaces to encourage widespread adoption among employees and third parties.
- Implement Adaptive, Risk-Based Controls: Use contextual factors such as device health and user behavior to guide access decisions.
- Improve Visibility and Monitoring: Centralize session logging and real-time tracking to enhance governance and threat detection.
- Test AI Capabilities in High-Value Areas: Pilot AI in areas like anomaly detection and dynamic access control to build trust and momentum for broader adoption.