• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Metadata Management Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Edge Distribution Platforms
      • Intranet Packaged Solutions
      • SD-WAN
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • IT Service Management Platforms
      • Endpoint Management Tools
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Voice of the Customer Platforms
      • Customer Data Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Adaptive Project Management and Reporting
      • View All
    • Public Sector and Government

      • Government ERP Solutions
      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • Business Orchestration and Automation Technologies
      • Business Process Automation Tools
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Enterprise Architecture Tools
      • Custom Software Development Services
      • Code Review Tools
      • Domain Registrars
      • Digital Adoption Platforms
      • Game Engine Software
      • Website Builders
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Developer Productivity Insight Platforms
      • API Generation Software
      • AI Agents for Application Developers
      • Feature Management
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Application Crowdtesting Services
      • Prototyping Software
      • Mobile App Analytics
      • Test Data Management
      • Virtual Reality Development Software
      • Green Software Engineering
      • Application Integration Platforms
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Event Brokers
      • AI-Augmented Code Modernization Tools
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Digital Twin of an Organization Platforms
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • AI Agent Development Platforms for Software Engineering
      • Application Composition Platform
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Internal Developer Portals
      • Load Testing Tools
      • Mobile Development Frameworks
      • Cloud Development Environments
      • B2B Gateway Software
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Blockchain Consulting and Proof-of-Concept Development Services
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • API and MCP Testing Tools
      • Value Stream Management Platforms
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
CPS Secure Remote Access

CPS Secure Remote Access Reviews and Ratings

What is CPS Secure Remote Access?

Gartner defines the cyber-physical systems (CPS) secure remote access products market as products that enable employees, contractors or original equipment manufacturers (OEMs) to safely and securely operate, maintain or update CPS remotely. These products provide a robust mechanism to verify remote users’ authenticity and authorization, enforce granular access policies for both users and systems, ensure secure communications, and track the integrity of user actions. Organizations can deploy these products in cloud, on-premises or in a hybrid environment.

Learn More About This Category
How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 11 of 11
Sort by
Logo of BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access

By BeyondTrust

4.5
(34 Ratings)

BeyondTrust Privileged Remote Access is a software designed to enable secure and controlled remote access to internal systems for authorized users such as vendors and employees. The software provides session management capabilities that include granular access controls, real-time monitoring, and detailed audit trails to help organizations maintain accountability and visibility over privileged activity. It supports integration with identity management solutions and offers multi-factor authentication to strengthen security. Through its centralized platform, the software addresses business requirements for reducing the risks associated with unmanaged remote access, helping organizations enforce policies for privileged sessions and meeting regulatory compliance needs without requiring a virtual private network.

Show More Details
Logo of Prisma Access

Prisma Access

By Palo Alto Networks

4.4
(26 Ratings)

Prisma Access is a cloud-delivered security software developed by Palo Alto Networks that provides secure access to applications and resources for users regardless of location. The software integrates firewall-as-a-service, secure web gateway, cloud access security broker, and zero trust network access capabilities. Prisma Access helps organizations protect remote and hybrid workforces by offering consistent security policies, threat prevention, and encrypted traffic inspection. The software addresses challenges related to secure connectivity, visibility, and control over application usage while supporting secure connections for mobile users and branch offices. It is designed to simplify network security management and improve compliance across distributed environments.

Show More Details
Logo of Dispel

Dispel

By Dispel

4.8
(19 Ratings)

Dispel is a software designed to secure remote access to operational technology environments by utilizing moving target defense and encrypted network pathways. The software offers features such as real-time monitoring, multi-factor authentication, and user activity logging to enhance control and accountability. Dispel focuses on mitigating risks associated with remote connectivity by dynamically changing network routes, reducing exposure to potential cyber threats. The software is used by organizations to facilitate secure administration and maintenance of industrial systems while addressing the business problem of unauthorized access and persistent threats in remote operational networks.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.1
(14 Ratings)

Armis Centrix for Asset Management and Security is a solution that helps organizations manage and secure their connected assets across IT, OT, IoT, medical device environments whether they are physical, virtual or a combination. It provides capabilities for asset discovery, classification, and tracking to improve visibility and support informed decision-making. The solution includes analytics and security features for real-time monitoring, threat detection, and response, helping organizations reduce cyber risks and maintain operational efficiency. It integrates with existing IT and security systems to support comprehensive asset governance and risk management.

Show More Details
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.3
(13 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of Xona Platform

Xona Platform

By Xona

4.7
(7 Ratings)

The Xona Platform is a SOC 2 certified secure access platform. The Xona Platform is purpose-built for critical infrastructure, delivering complete control over who, what, when, where, and how all users (employees, 3rd party contractors, and OEMs) access critical systems. The Xona Platform protects critical systems from insecure endpoints, replacing VPNs, jump servers, and other access technologies that leave infrastructure exposed. With zero-trust enforcement and full auditability, Xona ensures compliance with critical infrastructure security mandates—NERC CIP, IEC 62443, TSA SD2, NIS 2, and others—simplifying governance while strengthening operational security. Trusted in over 40 countries worldwide.

Show More Details
Logo of WALLIX One

WALLIX One

By WALLIX

4.3
(6 Ratings)

WALLIX One is a cloud-based access management software designed to secure and control privileged access to information systems. The software enables organizations to manage user identities, authentication, and permissions while providing session monitoring and traceability for compliance purposes. It automates the administration of user rights and credentials, supports secure password vaulting, and allows detailed auditing of activities on sensitive systems. By delivering centralized oversight of user actions and reducing the risk of unauthorized access, WALLIX One addresses business needs related to safeguarding digital assets and meeting regulatory requirements for data protection and privacy.

Show More Details
Logo of Cyolo PRO

Cyolo PRO

By Cyolo

5
(1 Rating)

Cyolo PRO is a software designed to facilitate secure access management for organizations, focusing on enabling connectivity to applications, systems, and environments across on-premises and cloud infrastructures. The software supports identity-based access by verifying user identities before granting entry to resources, helping address the challenge of unauthorized access and potential security breaches. Cyolo PRO offers features such as multi-factor authentication, session recording, policy-based access rules, and comprehensive auditing capabilities. The software operates without requiring changes to existing infrastructure or credentials, aiming to streamline the deployment process. By providing visibility and control over user access, Cyolo PRO assists organizations in protecting sensitive data and maintaining compliance with security regulations.

Show More Details
Logo of Xage Fabric Platform

Xage Fabric Platform

By Xage Security

5
(1 Rating)

The Xage Fabric Platform delivers universal zero trust network access (ZTNA) and asset protection. With the Xage Fabric Platform, organizations can provide users with identity- and context-based access to cyber-physical systems, enterprise data centers and cloud assets remotely from one unified platform. Operators can work in real-time in a secure virtual operations center with partners, service providers, and remote employees, powered by Xage’s multi-user session collaboration. All of these capabilities have Single Sign-On and Multi-factor Authentication at every site, down to each individual operational asset. Xage continues enabling local authentication and access, and enforcing access policies, even if a remote site loses network or cloud connectivity. With Xage zero trust network access, operations are able to protect assets from discovery by attackers, prevent lateral movement and reduce operational complexity.

Show More Details
Logo of BlastShield

BlastShield

By BlastWave

BlastShield is a software designed to provide secure remote access and network segmentation for enterprises. The software uses cryptographic identity-based authentication, enabling organizations to implement access policies without reliance on traditional credentials. BlastShield enables secure microsegmentation by allowing users and services to communicate only with authorized network resources, thereby reducing the attack surface. The software integrates with existing infrastructure and supports multi-cloud, on-premises, and hybrid environments. BlastShield is used to address challenges related to zero trust security frameworks, privileged access management, and lateral movement of threats within a network. It facilitates regulatory compliance and simplifies network management by automating security enforcement and minimizing manual configuration.

Be the first to .
Logo of Secomea Prime

Secomea Prime

By Secomea

Secomea Prime is an industrial remote access software designed to facilitate secure connectivity between users and industrial equipment. The software provides tools for configuring, monitoring, and maintaining devices such as PLCs, HMIs, and other automation hardware remotely. Secomea Prime features centralized management, user authentication, and encrypted data transfer to address security requirements. It supports integration with various industrial protocols and devices, offering capabilities for diagnostics, updates, and troubleshooting without physical presence at the site. The software aims to reduce operational downtime and travel expenses by enabling remote troubleshooting and maintenance in manufacturing and industrial environments.

Be the first to .

Features of CPS Secure Remote Access

Updated March 2026

Mandatory Features:

  • Support for third-party access: Facilitate secure access for external vendors, contractors and employees.

  • Agentless access: Provide access without installing software on CPS assets or remote endpoints, simplifying deployment and minimizing disruption.

  • Multifactor authentication (MFA): Require more than one authentication method to verify user identity.

  • Time-sensitive features: Permit connections only during predefined times, for specific durations, and/or automatically time out/suspend sessions that remain idle for too long.

  • Granular access controls based on least privilege: Define precise access policies that specify what users can access (e.g., specific devices, applications and data), when they can access it (time-based access) and under what conditions.

  • Password vaulting: Enable access to locked devices without directly sharing passwords.

  • Approval workflow: Allow remote access only after prior approval from appropriate stakeholders through a specific workflow.

  • Gateway termination and inspection: Terminate all CPS protocol sessions, for example, Modbus, DNP3 and Open Platform Communications Unified Architecture (OPC UA), at a secure gateway to enable deep packet inspection and enforce security policies.

  • Flexible deployment models: Offer on-premises, cloud or a hybrid model to meet operational needs.

  • Comprehensive monitoring, logging and auditing: Track, log, and record sessions in real time; audit user activities and connections to provide visibility, accountability and a complete audit trail for compliance and security management. Enable production engineers to monitor and terminate sessions as needed.

  • Regulatory compliance support: Help organizations meet various industry standards and regulatory mandates or frameworks, such as IEC 62443, NIST SP 800-82 Rev3, NIS2, NERC-CIP, NIST CSF or ISO 27001.

  • Authentication and validation: Authenticate and validate every user, device, asset and connection before granting access.

  • Compatibility with diverse environments: Connect to any CPS (such as PLCs, HMIs, SCADA or DCS) and support native protocols for existing industrial machines.

  • Identity and access management (IAM) integration: Manage user identities and access by including or integrating with existing identity providers (e.g., Microsoft Azure Active Directory, Okta and Ping Identity) to strengthen security and centralize control.

Gartner Client Insights

Market Guide for CPS Secure Remote Access

Top Trending Products

Prisma AccessBeyondTrust Privileged Remote AccessArmis CentrixWALLIX OneThe Claroty PlatformCyolo PROXona Platform

Popular Product Comparisons

Dispel vs Xona PlatformBeyondTrust Privileged Remote Access vs DispelDispel vs The Claroty PlatformBeyondTrust Privileged Remote Access vs The Claroty PlatformBeyondTrust Privileged Remote Access vs Prisma Access

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.