{"id":3597,"date":"2025-10-16T13:43:30","date_gmt":"2025-10-16T11:43:30","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?p=3597"},"modified":"2025-10-16T14:06:17","modified_gmt":"2025-10-16T12:06:17","slug":"can-cybersecurity-drive-growth-survey-results-surprise","status":"publish","type":"post","link":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/","title":{"rendered":"Can Cybersecurity Drive Growth? Survey Results Surprise"},"content":{"rendered":"<p><strong>For years, cybersecurity has been seen largely as a roadblock in manufacturing and other critical industries.\u00a0This is at least partly because OT environments simply weren\u2019t built with security in mind. They were designed to be isolated. Air-gapped. Closed off from the outside world. And as long as everything stayed on-site and hermetically sealed, the risk of a breach or other security incident stayed low.<\/strong><\/p>\n<p>But then came a revolutionary shift: more digital integration, more remote access, more third-party vendors. Suddenly, connectivity in manufacturing was considered essential \u2013 and therefore so was cybersecurity.<\/p>\n<p>In many if not most cases, early security tools added friction.\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbcj0\">Solutions created for IT settings adapted poorly to OT<\/a>\u00a0environments, leading to user frustration, operational delays and even safety risks \u2013 and giving rise to the notion that security inhibits efficiency and productivity.<\/p>\n<p>And this depiction of cybersecurity as a blocker has persisted, even as emerging security solutions have actually allowed industrial organizations to work in new and more efficient ways.<\/p>\n<p>Secure remote access (SRA) is a perfect example. Many\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbgl0\">companies adopted SRA out of pure necessity\u00a0<\/a>during the covid pandemic. But it gradually became clear that enabling remote work has widespread benefits, many of which contribute directly to the bottom line.<\/p>\n<p>A\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbcn0\">new report from Takepoint Research (TPR) and Cyolo<\/a>\u00a0explores how\u00a0manufacturers are changing their perspective on SRA, from a barrier to a business accelerator.<\/p>\n<p>Now let\u2019s talk about\u00a0why.<\/p>\n<h3><strong>How Secure Remote Access Became an Unexpected Growth Engine<\/strong><\/h3>\n<p>The TPR\/Cyolo study, based on a survey of 535 qualified manufacturing professionals across North America and EMEA \u2013 including CISOs, OT security leads, and operations managers \u2013 found that\u00a0SRA isn\u2019t just protecting businesses. It\u2019s powering them.<\/p>\n<ul>\n<li>64% use SRA to enable real-time access to critical systems<\/li>\n<li>67% cited improved third-party collaboration as the biggest benefit of implementing SRA<\/li>\n<li>58% reported higher operational efficiency and productivity<\/li>\n<li>50% have experienced cost savings<\/li>\n<\/ul>\n<p>These responses reveal the degree to which SRA is helping to keep plants running, supply chains moving, and teams collaborating across borders and time zones.<\/p>\n<h3><strong>Why UX Can Make or Break an SRA Solution<\/strong><\/h3>\n<p>Despite widespread adoption and high satisfaction with secure remote access in general, many manufacturers are markedly less enthusiastic about the specific SRA tools they currently have deployed.<\/p>\n<p>Less than 7% are \u201cvery satisfied\u201d with the effectiveness of SRA measures now in place, and the average user experience (UX) rating is just 2.5 out of 5.<\/p>\n<p>Translation: most access solutions still feel like they were built by someone who\u2019s never set foot in a plant, let alone designed with operators or engineers in mind.<\/p>\n<p>If your users need seven different logins and a degree in portal navigation just to access a programmable logic controller (PLC), guess what happens?\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbcq0\">They\u2019ll find a workaround<\/a>. And chances are, that workaround will bypass security altogether.<\/p>\n<p>But better UX changes that. 66% of survey respondents said improved UX boosts productivity. And 57% linked it to stronger compliance.<\/p>\n<p>Bottom line: the best security tool is the one people actually use.\u00a0And tools that are easy to use are built with UX in mind from the start.<\/p>\n<p>When access is simple and intuitive with good UX, it increases adoption across the board, supporting smoother operations and reinforcing security policies. Making it a direct path to better performance and measurable business value.<\/p>\n<p>That value becomes even more apparent when we look at who actually\u00a0has\u00a0access permissions \u2013 and who doesn\u2019t.<\/p>\n<h3><strong>Rethinking Access for Third Parties vs. Internal Teams<\/strong><\/h3>\n<p>According to the report, a staggering\u00a088% of manufacturers allow remote third-party access to OT systems. 60% grant such access to over 100 external vendors, OEMs, and contractors.<\/p>\n<p>Why?<\/p>\n<p>Because\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbgt0\">third parties and OEMs keep operations running<\/a>\u00a0(and keep warranties from being voided). Because flying out support engineers for a ten-minute fix no longer makes business sense. And because remote diagnostics and support have become the new norm.<\/p>\n<p>Yet in a surprising twist,\u00a0only 54% authorize internal employees to remotely access OT environments. So while a huge majority of companies are comfortable opening the door to outsiders, they\u2019re less likely to offer remote access as an option for their own employees.<\/p>\n<p>This gap suggests a reactive approach: grant access when forced, not\u00a0when there\u2019s potential to create value.<\/p>\n<p>Why not reframe SRA as a proactive, strategic tool, giving internal teams the same flexibility and operational agility that external partners already enjoy? The result will be even quicker fixes, smoother workflows, and a stronger case for attracting and retaining top technical talent.<\/p>\n<h3><strong>AI is Improving Access (Without Taking Over)<\/strong><\/h3>\n<p>SRA isn\u2019t just about connection \u2013 it\u2019s increasingly about intelligence. And AI is now officially in the mix.<\/p>\n<ul>\n<li>96% of surveyed manufacturers are using or plan to use AI to strengthen SRA<\/li>\n<li>61% cite threat detection and response as the biggest area of AI impact<\/li>\n<li>47% believe AI will improve compliance and risk management<\/li>\n<li>38% say AI helps flag issues before they escalate<\/li>\n<\/ul>\n<p>This isn\u2019t \u2018AI-will-solve-everything\u2019 hype. It\u2019s about adding AI capabilities where they can provide practical, tangible gains. Cyolo PRO (Privileged Remote Operations) with Intelligent Supervision, for instance,\u00a0<a href=\"https:\/\/hubs.la\/Q03Mdbgv0\">eases heavy admin burdens without removing human oversight<\/a>.<\/p>\n<p>AI won\u2019t (and shouldn&#8217;t) replace your security team \u2013 but it can be a valuable assistant. When integrated effectively, AI boosts visibility, speeds up insights, and scales operations without bottlenecks for stronger plant performance and greater resilience.<\/p>\n<h3><strong>It\u2019s More Than \u2018Just\u2019 Cybersecurity \u2013 It\u2019s a Business Advantage<\/strong><\/h3>\n<p>The numbers are in.<\/p>\n<p>Secure remote access is no longer just a safety net \u2013 it\u2019s a springboard.<\/p>\n<p>In manufacturing and other critical industries, the right SRA strategy can help teams move faster with quicker diagnostics. It makes third-party access manageable instead of messy. It improves everyone\u2019s daily workflow, from the control room to the C-suite.<\/p>\n<p>And it lays the foundation for achieving long-term business goals without added complexity or overhead.<\/p>\n<p>When designed for real-world environments and situations, SRA doesn\u2019t just close security gaps \u2013 it opens up new business opportunities.<\/p>\n<p><a href=\"https:\/\/hubs.la\/Q03Mdbcn0\">Download the full report<\/a>\u00a0to see how leading manufacturers are using SRA to move forward faster, smarter, and more securely.<\/p>\n<p><em>This blog was originally published at <a href=\"https:\/\/cyolo.io\/blog\/how-secure-remote-access-became-an-unexpected-growth-engine\">https:\/\/cyolo.io\/blog\/how-secure-remote-access-became-an-unexpected-growth-engine<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, cybersecurity has been seen largely as a roadblock in manufacturing and other critical industries.\u00a0This is at least partly because OT environments simply weren\u2019t built with security in mind. They were designed to be isolated. Air-gapped. Closed off from the outside world. And as long as everything stayed on-site and hermetically sealed, the risk [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":3598,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"For years, cybersecurity has been seen largely as a roadblock in manufacturing and other critical industries.\u00a0This is at least partly because OT environments simply weren\u2019t built with security in mind. They were designed to be isolated. Air-gapped. Closed off from the outside world. And as long as everything stayed on-site and hermetically sealed, the risk [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-16T11:43:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T12:06:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Line\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Line\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/\",\"name\":\"Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg\",\"datePublished\":\"2025-10-16T11:43:30+00:00\",\"dateModified\":\"2025-10-16T12:06:17+00:00\",\"author\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\"},\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg\",\"contentUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can Cybersecurity Drive Growth? Survey Results Surprise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\",\"name\":\"Line\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"caption\":\"Line\"},\"url\":\"https:\/\/insightevents.dk\/isc-cph\/author\/line\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/","og_locale":"en_GB","og_type":"article","og_title":"Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen","og_description":"For years, cybersecurity has been seen largely as a roadblock in manufacturing and other critical industries.\u00a0This is at least partly because OT environments simply weren\u2019t built with security in mind. They were designed to be isolated. Air-gapped. Closed off from the outside world. And as long as everything stayed on-site and hermetically sealed, the risk [&hellip;]","og_url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/","og_site_name":"Industrial Security Conference Copenhagen","article_published_time":"2025-10-16T11:43:30+00:00","article_modified_time":"2025-10-16T12:06:17+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg","type":"image\/jpeg"}],"author":"Line","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Line","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/","url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/","name":"Can Cybersecurity Drive Growth? Survey Results Surprise - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage"},"image":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage"},"thumbnailUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg","datePublished":"2025-10-16T11:43:30+00:00","dateModified":"2025-10-16T12:06:17+00:00","author":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c"},"breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#primaryimage","url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg","contentUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Can-Cybersecurity-Drive-Growth_-Survey-Results-Surprise.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/can-cybersecurity-drive-growth-survey-results-surprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Can Cybersecurity Drive Growth? Survey Results Surprise"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c","name":"Line","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","caption":"Line"},"url":"https:\/\/insightevents.dk\/isc-cph\/author\/line\/"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3597"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=3597"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media\/3598"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/categories?post=3597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/tags?post=3597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}