• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Cyber-Physical Systems (CPS) Secure Remote Access Solutions

Cyber-Physical Systems (CPS) Secure Remote Access Solutions Reviews and Ratings

What are Cyber-Physical Systems (CPS) Secure Remote Access Solutions?

Cyber-physical systems (CPS) secure remote access solutions allow employees, contractors and OEMs to access production or mission-critical assets remotely for the purpose of safely and securely operating, maintaining or updating them. They provide a robust mechanism to verify the identity of users, ensure secure communications and track the integrity of the actions being taken. Unlike traditional remote access methods, which often lack the granularity and security needed for CPS, these solutions offer specialized features such as agentless access, reliable operation in high-latency or intermittently connected environments, and the ability to provide access to specific devices rather than entire networks. This ensures that both internal and third-party users can securely interact with CPS without compromising the integrity or security of the system. They also support multiple security controls such as sessions management/recording, file transfers with malware scanning, multifactor authentication (MFA), audit trails, and least privilege over access, assets and sessions. These solutions are crucial because CPS, which intertwine computational elements with physical machinery and infrastructure (like industrial control systems, smart grids, or autonomous vehicles), can suffer severe real-world consequences - including safety hazards, environmental damage, or operational failure-if accessed inappropriately or maliciously.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 11 of 11
Sort by
Logo of BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access

By BeyondTrust

4.5
(24 Ratings)

BeyondTrust Privileged Remote Access is a software designed to enable secure and controlled remote access to internal systems for authorized users such as vendors and employees. The software provides session management capabilities that include granular access controls, real-time monitoring, and detailed audit trails to help organizations maintain accountability and visibility over privileged activity. It supports integration with identity management solutions and offers multi-factor authentication to strengthen security. Through its centralized platform, the software addresses business requirements for reducing the risks associated with unmanaged remote access, helping organizations enforce policies for privileged sessions and meeting regulatory compliance needs without requiring a virtual private network.

Show More Details
Logo of Dispel

Dispel

By Dispel

4.8
(19 Ratings)

Dispel is a software designed to secure remote access to operational technology environments by utilizing moving target defense and encrypted network pathways. The software offers features such as real-time monitoring, multi-factor authentication, and user activity logging to enhance control and accountability. Dispel focuses on mitigating risks associated with remote connectivity by dynamically changing network routes, reducing exposure to potential cyber threats. The software is used by organizations to facilitate secure administration and maintenance of industrial systems while addressing the business problem of unauthorized access and persistent threats in remote operational networks.

Show More Details
Logo of Prisma Access

Prisma Access

By Palo Alto Networks

4.4
(11 Ratings)

Prisma Access is a cloud-delivered security software developed by Palo Alto Networks that provides secure access to applications and resources for users regardless of location. The software integrates firewall-as-a-service, secure web gateway, cloud access security broker, and zero trust network access capabilities. Prisma Access helps organizations protect remote and hybrid workforces by offering consistent security policies, threat prevention, and encrypted traffic inspection. The software addresses challenges related to secure connectivity, visibility, and control over application usage while supporting secure connections for mobile users and branch offices. It is designed to simplify network security management and improve compliance across distributed environments.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.2
(9 Ratings)

Armis Centrix for Asset Management and Security is a solution that helps organizations manage and secure their connected assets across IT, OT, IoT, medical device environments whether they are physical, virtual or a combination. It provides capabilities for asset discovery, classification, and tracking to improve visibility and support informed decision-making. The solution includes analytics and security features for real-time monitoring, threat detection, and response, helping organizations reduce cyber risks and maintain operational efficiency. It integrates with existing IT and security systems to support comprehensive asset governance and risk management.

Show More Details
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.4
(8 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of Xona Platform

Xona Platform

By Xona

4.7
(6 Ratings)

The Xona Platform is a SOC 2 certified secure access platform. The Xona Platform is purpose-built for critical infrastructure, delivering complete control over who, what, when, where, and how all users (employees, 3rd party contractors, and OEMs) access critical systems. The Xona Platform protects critical systems from insecure endpoints, replacing VPNs, jump servers, and other access technologies that leave infrastructure exposed. With zero-trust enforcement and full auditability, Xona ensures compliance with critical infrastructure security mandates—NERC CIP, IEC 62443, TSA SD2, NIS 2, and others—simplifying governance while strengthening operational security. Trusted in over 40 countries worldwide.

Show More Details
Logo of Neeve

Neeve

By Neeve

4.3
(3 Ratings)

Neeve is a software designed to enable enterprises to automate and orchestrate business processes using artificial intelligence and natural language understanding. The software facilitates the creation of AI-powered conversational agents that can interpret user intents, extract relevant information, and execute workflows across multiple backend systems. Neeve supports integration with existing enterprise applications, allowing businesses to streamline routine operations and enhance efficiency in handling tasks such as customer support, internal service requests, and data processing. The software provides a platform for developing, deploying, and managing intelligent process automation solutions aimed at reducing manual effort and improving operational consistency across various business functions.

Show More Details
Logo of WALLIX One

WALLIX One

By WALLIX

4.3
(3 Ratings)

WALLIX One is a cloud-based access management software designed to secure and control privileged access to information systems. The software enables organizations to manage user identities, authentication, and permissions while providing session monitoring and traceability for compliance purposes. It automates the administration of user rights and credentials, supports secure password vaulting, and allows detailed auditing of activities on sensitive systems. By delivering centralized oversight of user actions and reducing the risk of unauthorized access, WALLIX One addresses business needs related to safeguarding digital assets and meeting regulatory requirements for data protection and privacy.

Show More Details
Logo of Xage OT Secure Remote Access

Xage OT Secure Remote Access

By Xage Security

5
(1 Rating)

Xage OT Secure Remote Access is a software designed to enable secure remote connectivity to operational technology environments. The software controls and manages user access to critical systems by incorporating granular permission controls, multi-factor authentication, and session monitoring. Xage OT Secure Remote Access offers administrators the ability to define access policies and ensures that remote connections are auditable and compliant with organizational protocols. It addresses the business problem of granting remote access to industrial networks in a controlled manner, helping organizations protect operational infrastructure from unauthorized activities and reducing the risks associated with remote maintenance and troubleshooting.

Show More Details
Logo of Cyolo PRO

Cyolo PRO

By Cyolo

Cyolo PRO is a software designed to facilitate secure access management for organizations, focusing on enabling connectivity to applications, systems, and environments across on-premises and cloud infrastructures. The software supports identity-based access by verifying user identities before granting entry to resources, helping address the challenge of unauthorized access and potential security breaches. Cyolo PRO offers features such as multi-factor authentication, session recording, policy-based access rules, and comprehensive auditing capabilities. The software operates without requiring changes to existing infrastructure or credentials, aiming to streamline the deployment process. By providing visibility and control over user access, Cyolo PRO assists organizations in protecting sensitive data and maintaining compliance with security regulations.

Be the first to .
Logo of Secomea Prime

Secomea Prime

By Secomea

Secomea Prime is an industrial remote access software designed to facilitate secure connectivity between users and industrial equipment. The software provides tools for configuring, monitoring, and maintaining devices such as PLCs, HMIs, and other automation hardware remotely. Secomea Prime features centralized management, user authentication, and encrypted data transfer to address security requirements. It supports integration with various industrial protocols and devices, offering capabilities for diagnostics, updates, and troubleshooting without physical presence at the site. The software aims to reduce operational downtime and travel expenses by enabling remote troubleshooting and maintenance in manufacturing and industrial environments.

Be the first to .

Top Trending Products

BeyondTrust Privileged Remote AccessPrisma AccessArmis CentrixThe Claroty PlatformWALLIX OneNeeveXona PlatformDispelXage OT Secure Remote Access

Popular Product Comparisons

Dispel vs Xona PlatformDispel vs The Claroty PlatformBeyondTrust Privileged Remote Access vs DispelBeyondTrust Privileged Remote Access vs The Claroty PlatformBeyondTrust Privileged Remote Access vs Prisma AccessXage OT Secure Remote Access vs Xona Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.