Wed Sep 18 03:00:35 UTC 2024: ## Remote Access Tool Sprawl Creates Security Risks for Organizations: Claroty Study

**[City, State] – [Date]** – A new study by cybersecurity firm Claroty has revealed a concerning trend: organizations are using an excessive number of remote access tools, creating security vulnerabilities and operational complexities. The research, which analyzed data from over 50,000 devices, found that 55% of organizations deploy four or more remote access tools, with 33% using six or more. Alarmingly, almost 22% utilize eight or more tools, and some even manage as many as 15 or 16.

This “tool sprawl” poses significant security risks, particularly within operational technology (OT) networks. The study found that 79% of organizations have more than two non-enterprise-grade tools installed on OT network devices. These tools often lack basic security features like session recording, auditing, role-based access control, and even multi-factor authentication (MFA).

The consequences of relying on such tools are substantial:

* **Increased Exposure:** Substandard security practices and leaked credentials become more likely to penetrate the network due to the increased number of entry points.
* **Operational Complexity:** Managing a multitude of solutions leads to higher operational costs and increased difficulty in maintaining security.
* **Lack of Visibility:** Third-party vendors using their own remote access tools can create blind spots for OT network administrators and security personnel.

Recent high-profile breaches involving remote access solutions like TeamViewer and AnyDesk underscore the vulnerability of these tools.

“Since the pandemic, organizations have increasingly turned to remote access solutions, but this has created a security and operational dilemma,” stated Tal Laufer, VP Products, Secure Access at Claroty. He highlighted the need to avoid excessive tool sprawl in sensitive OT networks, as it leads to increased risk and complexity.

Gartner, a leading research and advisory company, recommends organizations take proactive measures to address the remote access tool sprawl:

* **Inventory All Connections:** Conduct a comprehensive inventory of all remote connections across the entire organization, as shadow remote access likely exists.
* **Remove Older Solutions:** When deploying new secure remote access solutions, remove older, less secure ones to reduce vulnerabilities.

The study emphasizes the importance of a strategic approach to remote access management to mitigate security risks and ensure operational efficiency. Organizations must carefully select and manage their remote access tools, prioritizing security and robust access control measures to safeguard their critical systems.

Read More