{"id":1823,"date":"2026-05-20T13:40:02","date_gmt":"2026-05-20T10:40:02","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=1823"},"modified":"2026-05-20T14:51:47","modified_gmt":"2026-05-20T11:51:47","slug":"building-an-open-source-ot-remote-access-platform","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2026\/05\/20\/building-an-open-source-ot-remote-access-platform\/","title":{"rendered":"Building an Open-Source OT Remote Access Platform"},"content":{"rendered":"\n<p>Remote access has become one of the biggest challenges in OT and ICS environments.<\/p>\n\n\n\n<p>Industrial facilities often require vendors, engineers, system integrators, and support teams to remotely access:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HMIs<\/li>\n\n\n\n<li>engineering workstations<\/li>\n\n\n\n<li>historians<\/li>\n\n\n\n<li>Windows servers<\/li>\n\n\n\n<li>Linux systems<\/li>\n\n\n\n<li>virtualization platforms<\/li>\n<\/ul>\n\n\n\n<p>In many environments, this access was introduced years ago using:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>traditional VPNs<\/li>\n\n\n\n<li>exposed RDP services<\/li>\n\n\n\n<li>shared accounts<\/li>\n\n\n\n<li>unmanaged remote access tools<\/li>\n\n\n\n<li>direct vendor connectivity into OT networks<\/li>\n<\/ul>\n\n\n\n<p>While these methods may solve operational problems, they can also introduce major cybersecurity risks inside industrial environments.<\/p>\n\n\n\n<p>Apache Guacamole is an open-source browser-based remote access gateway that offers a different approach. Instead of exposing systems directly to external users, it centralizes remote access through a web interface while supporting authentication integration, auditing, access restrictions, and session management capabilities.<\/p>\n\n\n\n<p>In this article, we will look at how Apache Guacamole can help address common OT remote access challenges through features such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Browser-based remote access<\/li>\n\n\n\n<li>Multi-factor authentication (MFA)<\/li>\n\n\n\n<li>LDAP \/ Active Directory integration<\/li>\n\n\n\n<li>Single Sign-On (SSO)<\/li>\n\n\n\n<li>Connection-level access control<\/li>\n\n\n\n<li>Session recording and auditing<\/li>\n\n\n\n<li>Clipboard and file transfer restrictions<\/li>\n\n\n\n<li>Brute-force protection<\/li>\n\n\n\n<li>Secure DMZ and jump-host deployment architecture<\/li>\n<\/ul>\n\n\n\n<p>It is important to understand that Apache Guacamole is not:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>a firewall<\/li>\n\n\n\n<li>a segmentation platform<\/li>\n\n\n\n<li>a PAM solution<\/li>\n\n\n\n<li>a replacement for OT security architecture<\/li>\n<\/ul>\n\n\n\n<p>It should be treated as a controlled remote access broker inside a properly segmented environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Browser-Based Remote Access<\/h1>\n\n\n\n<p>One of the common operational issues in OT environments is dependency on unmanaged remote access software.<\/p>\n\n\n\n<p>Many vendors still rely on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>standalone RDP clients<\/li>\n\n\n\n<li>SSH clients<\/li>\n\n\n\n<li>VNC software<\/li>\n\n\n\n<li>TeamViewer<\/li>\n\n\n\n<li>AnyDesk<\/li>\n\n\n\n<li>third-party remote support tools<\/li>\n<\/ul>\n\n\n\n<p>Apache Guacamole provides browser-based remote access through its HTML5 web interface and <code>guacd<\/code> service.<\/p>\n\n\n\n<p>Supported protocols include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RDP<\/li>\n\n\n\n<li>SSH<\/li>\n\n\n\n<li>VNC<\/li>\n\n\n\n<li>Telnet (legacy environments)<\/li>\n<\/ul>\n\n\n\n<p>Relevant components:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacd<\/code><\/li>\n\n\n\n<li><code>guacamole.war<\/code><\/li>\n<\/ul>\n\n\n\n<p>Relevant configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>guacd-hostname: localhost\nguacd-port: 4822\n<\/code><\/pre>\n\n\n\n<p>Instead of this:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Vendor Laptop\n     \u2193\nVPN\n     \u2193\nDirect RDP Access\n     \u2193\nEngineering Workstation\n<\/code><\/pre>\n\n\n\n<p>Organizations can move toward:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Vendor\n     \u2193\nBrowser\n     \u2193\nGuacamole\n     \u2193\nApproved Internal System\n<\/code><\/pre>\n\n\n\n<p>This helps organizations centralize and control remote access sessions while reducing unmanaged software inside the environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Multi-Factor Authentication (MFA)<\/h1>\n\n\n\n<p>Weak authentication and shared accounts remain common issues in industrial environments.<\/p>\n\n\n\n<p>Apache Guacamole supports MFA using authentication extensions.<\/p>\n\n\n\n<p>Supported MFA extensions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacamole-auth-totp<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-duo<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-sso-saml<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-sso-openid<\/code><\/li>\n<\/ul>\n\n\n\n<p>Example TOTP configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>totp-issuer: OT-Remote-Access\ntotp-digits: 6\ntotp-period: 30\n<\/code><\/pre>\n\n\n\n<p>Example Duo configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>duo-api-hostname:\nduo-integration-key:\nduo-secret-key:\nduo-application-key:\n<\/code><\/pre>\n\n\n\n<p>This allows organizations to strengthen authentication security for remote vendor and engineering access.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">LDAP and Active Directory Integration<\/h1>\n\n\n\n<p>Managing remote access accounts independently across OT systems becomes difficult over time.<\/p>\n\n\n\n<p>Apache Guacamole supports LDAP and Active Directory integration using:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>guacamole-auth-ldap\n<\/code><\/pre>\n\n\n\n<p>Relevant configuration examples:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ldap-hostname:\nldap-port:\nldap-user-base-dn:\nldap-search-bind-dn:\nldap-search-bind-password:\nldap-username-attribute:\n<\/code><\/pre>\n\n\n\n<p>This allows organizations to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>centralize identity management<\/li>\n\n\n\n<li>integrate with Active Directory<\/li>\n\n\n\n<li>apply role-based access<\/li>\n\n\n\n<li>remove access centrally<\/li>\n\n\n\n<li>reduce unmanaged local accounts<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Single Sign-On (SSO)<\/h1>\n\n\n\n<p>Many organizations want remote access integrated into existing enterprise identity systems.<\/p>\n\n\n\n<p>Apache Guacamole supports SSO extensions including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SAML<\/li>\n\n\n\n<li>OpenID Connect<\/li>\n\n\n\n<li>CAS<\/li>\n<\/ul>\n\n\n\n<p>Relevant extensions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacamole-auth-sso-saml<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-sso-openid<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-cas<\/code><\/li>\n<\/ul>\n\n\n\n<p>Example SAML configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>saml-idp-url:\nsaml-entity-id:\nsaml-callback-url:\nsaml-strict: true\n<\/code><\/pre>\n\n\n\n<p>Example OpenID configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>openid-authorization-endpoint:\nopenid-jwks-endpoint:\nopenid-issuer:\nopenid-client-id:\nopenid-client-secret:\nopenid-redirect-uri:\n<\/code><\/pre>\n\n\n\n<p>This helps organizations integrate centralized authentication workflows into remote access infrastructure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Connection-Level Access Control<\/h1>\n\n\n\n<p>A common OT security problem is excessive vendor access inside industrial networks.<\/p>\n\n\n\n<p>Apache Guacamole supports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>connection permissions<\/li>\n\n\n\n<li>user groups<\/li>\n\n\n\n<li>connection groups<\/li>\n\n\n\n<li>role-based access management<\/li>\n<\/ul>\n\n\n\n<p>Database-backed access control is supported using:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacamole-auth-jdbc-mysql<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-jdbc-postgresql<\/code><\/li>\n<\/ul>\n\n\n\n<p>This allows organizations to restrict which systems each user may access instead of providing unrestricted network-level access.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Clipboard and File Transfer Restrictions<\/h1>\n\n\n\n<p>File transfer and clipboard access can introduce operational and security risks inside OT environments.<\/p>\n\n\n\n<p>Apache Guacamole supports restricting:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>clipboard usage<\/li>\n\n\n\n<li>copy\/paste operations<\/li>\n\n\n\n<li>drive redirection<\/li>\n\n\n\n<li>file transfers<\/li>\n<\/ul>\n\n\n\n<p>Relevant configuration examples:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>disable-copy=true\ndisable-paste=true\nenable-drive=false\n<\/code><\/pre>\n\n\n\n<p>This can help reduce:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>malware introduction<\/li>\n\n\n\n<li>unauthorized tool uploads<\/li>\n\n\n\n<li>accidental file movement<\/li>\n\n\n\n<li>uncontrolled data transfers<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Session Recording and Auditing<\/h1>\n\n\n\n<p>One of the major issues in OT remote access environments is the lack of visibility into vendor activity.<\/p>\n\n\n\n<p>Apache Guacamole supports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>session history<\/li>\n\n\n\n<li>audit logging<\/li>\n\n\n\n<li>session recording<\/li>\n\n\n\n<li>connection tracking<\/li>\n<\/ul>\n\n\n\n<p>Recording configuration examples:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>recording-path:\n\/var\/lib\/guacamole\/recordings\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>create-recording-path=true\n<\/code><\/pre>\n\n\n\n<p>SSH recording support:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>typescript-path:\n<\/code><\/pre>\n\n\n\n<p>Database audit history tables include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacamole_connection_history<\/code><\/li>\n\n\n\n<li><code>guacamole_user_history<\/code><\/li>\n<\/ul>\n\n\n\n<p>This helps organizations improve:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>accountability<\/li>\n\n\n\n<li>auditing<\/li>\n\n\n\n<li>compliance<\/li>\n\n\n\n<li>incident investigations<\/li>\n\n\n\n<li>operational visibility<\/li>\n<\/ul>\n\n\n\n<p>Instead of relying entirely on trust, organizations gain the ability to review and investigate remote sessions when required.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Browser-Based Clientless Access<\/h1>\n\n\n\n<p>Apache Guacamole uses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>an HTML5 frontend<\/li>\n\n\n\n<li>WebSocket tunneling<\/li>\n<\/ul>\n\n\n\n<p>No additional client software is required on the endpoint.<\/p>\n\n\n\n<p>Reverse proxies must support:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Upgrade: websocket\n<\/code><\/pre>\n\n\n\n<p>This helps reduce dependency on unmanaged remote access software installed on vendor systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">SSL\/TLS Enforcement<\/h1>\n\n\n\n<p>Remote OT access should always use encrypted communications.<\/p>\n\n\n\n<p>Apache Guacamole deployments commonly use reverse proxies such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nginx<\/li>\n\n\n\n<li>Apache HTTP Server<\/li>\n<\/ul>\n\n\n\n<p>Example TLS configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>server {\n    listen 443 ssl;\n    ssl_certificate ...\n    ssl_certificate_key ...\n}\n<\/code><\/pre>\n\n\n\n<p>Relevant Guacamole proxy settings:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>proxy-hostname:\nproxy-port:\n<\/code><\/pre>\n\n\n\n<p>This helps protect:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>remote sessions<\/li>\n\n\n\n<li>credentials<\/li>\n\n\n\n<li>authentication traffic<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Brute-Force Protection<\/h1>\n\n\n\n<p>Internet-facing remote access systems are commonly targeted by password attacks.<\/p>\n\n\n\n<p>Apache Guacamole supports brute-force protection using:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>guacamole-auth-ban\n<\/code><\/pre>\n\n\n\n<p>Relevant configuration examples:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ban-address-duration: 300\nban-max-invalid-attempts: 5\nban-max-attempts-per-interval: 5\nban-login-failure-window: 60\n<\/code><\/pre>\n\n\n\n<p>This helps reduce automated login attack attempts against remote access portals.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Database-Backed Centralized Administration<\/h1>\n\n\n\n<p>Apache Guacamole supports centralized administration using:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MySQL<\/li>\n\n\n\n<li>PostgreSQL<\/li>\n<\/ul>\n\n\n\n<p>Supported extensions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>guacamole-auth-jdbc-mysql<\/code><\/li>\n\n\n\n<li><code>guacamole-auth-jdbc-postgresql<\/code><\/li>\n<\/ul>\n\n\n\n<p>Example MySQL configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>mysql-hostname:\nmysql-port:\nmysql-database:\nmysql-username:\nmysql-password:\n<\/code><\/pre>\n\n\n\n<p>Example PostgreSQL configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>postgresql-hostname:\npostgresql-port:\npostgresql-database:\npostgresql-username:\npostgresql-password:\n<\/code><\/pre>\n\n\n\n<p>This helps organizations centralize:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>users<\/li>\n\n\n\n<li>permissions<\/li>\n\n\n\n<li>audit data<\/li>\n\n\n\n<li>connection management<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Secure DMZ and Jump-Host Architecture<\/h1>\n\n\n\n<p>One of the most dangerous mistakes in OT environments is exposing RDP or engineering systems directly to the internet.<\/p>\n\n\n\n<p>Apache Guacamole should not provide unrestricted access directly into industrial networks.<\/p>\n\n\n\n<p>A more controlled deployment model places Guacamole behind:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>reverse proxies<\/li>\n\n\n\n<li>firewalls<\/li>\n\n\n\n<li>DMZ environments<\/li>\n\n\n\n<li>jump hosts<\/li>\n<\/ul>\n\n\n\n<p>This approach helps organizations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>centralize remote access<\/li>\n\n\n\n<li>reduce direct exposure of OT assets<\/li>\n\n\n\n<li>apply segmentation boundaries<\/li>\n\n\n\n<li>monitor vendor sessions<\/li>\n\n\n\n<li>restrict reachable systems<\/li>\n<\/ul>\n\n\n\n<p>instead of exposing engineering systems directly to external users.<\/p>\n\n\n\n<p>Suggested deployment diagram:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2026\/05\/gua-diagram-683x1024.png\" alt=\"\" class=\"wp-image-1830\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2026\/05\/gua-diagram-683x1024.png 683w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2026\/05\/gua-diagram-200x300.png 200w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2026\/05\/gua-diagram-768x1152.png 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2026\/05\/gua-diagram.png 1024w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Open Source and Operational Control<\/h1>\n\n\n\n<p>Many organizations are increasingly exploring open-source technologies to improve operational control and reduce dependency on proprietary ecosystems.<\/p>\n\n\n\n<p>Open-source platforms provide:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>self-hosted deployment flexibility<\/li>\n\n\n\n<li>visibility into configurations<\/li>\n\n\n\n<li>integration freedom<\/li>\n\n\n\n<li>reduced vendor lock-in<\/li>\n\n\n\n<li>deployment customization<\/li>\n<\/ul>\n\n\n\n<p>For OT environments, this becomes especially valuable when organizations require greater operational ownership over their remote access infrastructure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Final Thoughts<\/h1>\n\n\n\n<p>Remote access is now a normal operational requirement in many industrial environments. The challenge is making it secure, controlled, and operationally manageable.<\/p>\n\n\n\n<p>Apache Guacamole provides multiple features that can help organizations improve centralized remote access management in OT and ICS environments when deployed correctly.<\/p>\n\n\n\n<p>These capabilities include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>browser-based access<\/li>\n\n\n\n<li>MFA<\/li>\n\n\n\n<li>LDAP\/AD integration<\/li>\n\n\n\n<li>SSO<\/li>\n\n\n\n<li>session recording<\/li>\n\n\n\n<li>access restrictions<\/li>\n\n\n\n<li>brute-force protection<\/li>\n\n\n\n<li>centralized administration<\/li>\n\n\n\n<li>segmented deployment architectures<\/li>\n<\/ul>\n\n\n\n<p>Like any security technology, proper architecture and operational controls remain critical.<\/p>\n\n\n\n<p>Guacamole should not be viewed as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>a magic security product<\/li>\n\n\n\n<li>a replacement for segmentation<\/li>\n\n\n\n<li>a replacement for firewalls<\/li>\n\n\n\n<li>a replacement for OT security architecture<\/li>\n<\/ul>\n\n\n\n<p>Instead, it should be treated as a controlled remote access broker operating inside a properly designed OT environment.<\/p>\n\n\n\n<p>At <a href=\"https:\/\/zerontek.com\" target=\"_blank\" rel=\"noreferrer noopener\">ZeroNtek<\/a>, we help organizations worldwide design and deploy secure open-source solutions for both OT and IT environments.<\/p>\n\n\n\n<p>This includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>secure remote access architectures<\/li>\n\n\n\n<li>OT segmentation guidance<\/li>\n\n\n\n<li>logging and monitoring integration<\/li>\n\n\n\n<li>open-source OT security deployments<\/li>\n\n\n\n<li>hardening and operational support<\/li>\n<\/ul>\n\n\n\n<p>We strongly believe open-source technologies can play an important role in building more transparent, flexible, and sovereign security environments for critical infrastructure and industrial operations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/guacamole.apache.org\" target=\"_blank\" rel=\"noreferrer noopener\">Apache Guacamole Official Website<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/guacamole.apache.org\/doc\/gug\/configuring-guacamole.html\" target=\"_blank\" rel=\"noreferrer noopener\">Apache Guacamole Configuration Guide<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Remote access has become one of the biggest challenges in OT and ICS environments. Industrial facilities often require vendors, engineers, system integrators, and support teams to remotely access: In many environments, this access was introduced years ago using: While these methods may solve operational problems, they can also introduce major cybersecurity risks inside industrial environments. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1829,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[304,4,3,46,48,302],"tags":[303,7,6,47,27],"class_list":["post-1823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apache-guacamole","category-cyber-security","category-ics-security","category-ics-tools","category-ot-security","category-remote-access","tag-apache-guacamole","tag-cyber-security","tag-ics-security","tag-ot-security","tag-zerontek"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=1823"}],"version-history":[{"count":10,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1823\/revisions"}],"predecessor-version":[{"id":1837,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1823\/revisions\/1837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media\/1829"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=1823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=1823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=1823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}