Gartner defines cyber-physical systems (CPS) protection platforms as products that discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT. They do so by analyzing or interacting with industrial/industry-specific protocols and operational network traffic. They understand physical process asset behavior and do not interfere with CPS operations. They can be delivered from the cloud, on-premises or in a hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.
Gartner defines the cyber-physical systems (CPS) secure remote access products market as products that enable employees, contractors or original equipment manufacturers (OEMs) to safely and securely operate, maintain or update CPS remotely. These products provide a robust mechanism to verify remote users’ authenticity and authorization, enforce granular access policies for both users and systems, ensure secure communications, and track the integrity of user actions. Organizations can deploy these products in cloud, on-premises or in a hybrid environment.
Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines five distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, cloud infrastructure entitlement management (CIEM) and remote PAM (RPAM). Privileged access is access beyond the normal level granted to both human and machine accounts. It allows users to override existing access controls, change security configurations, or make changes affecting multiple users or systems. As privileged access can create, modify and delete IT infrastructure, along with company data contained in that infrastructure, it presents catastrophic risk. Managing privileged access is thus a critical security function for every organization and requires a specific set of procedures and tools. PAM tools focus on either privileged accounts or privileged commands.