Challenging the common assumption that cybersecurity hampers productivity, new research shows manufacturing leaders increasingly view secure remote access as a strategic enabler of business growth and operational efficiency
Cyolo, the leading provider of secure remote access for operational technology (OT) and cyber-physical systems (CPS), today released its latest research report, Can Cybersecurity Drive Growth? The Strategic Role of Secure Remote Access in Manufacturing.
Based on a global survey of manufacturing industry CISOs, CIOs, OT security leads, operations managers, and plant engineers, the report demonstrates how this vital sector is adapting to evolving market demands and increasing pressure to innovate faster and more securely.
The report reveals that a growing number of manufacturers are reframing cybersecurity as a core driver of business innovation, resilience, operational continuity, and productivity across globally connected environments – well beyond its traditional role as a risk mitigation tool. Cyolo’s research offers practical insights for manufacturers looking to align secure access strategies with business priorities, streamline OT operations, and secure legacy systems without compromising uptime or safety.
As manufacturers accelerate their Industry 4.0 transformations – with increasing digitalization, connectivity, and AI adoption – secure remote access (SRA) has become a foundational pillar for achieving measurable operational improvements, business gains, and sustained competitive advantage. The report found that 67% cited improved third-party collaboration as the top benefit of secure remote access, and 58% reported increased efficiency and cost savings (50%) – suggesting that secure access is no longer just about protection but also about creating tangible value across the enterprise.
“This report examines how global manufacturers are finally beginning to see cybersecurity as a business enabler rather than an inhibitor,” said Almog Apirion, CEO and co-founder of Cyolo. “Manufacturing today is about value creation, speed, and agility. This study shows that when implemented in the right way, secure remote access can become a catalyst for faster innovation, improved uptime, and greater productivity. In short, better cybersecurity means a bigger bottom line.”
Key findings in the report include:
- AI adoption is on the rise.
Over 96% of respondents have plans to incorporate AI into remote access security. Expected benefits include improved real-time threat detection and response (61%), better compliance (47%), and proactive risk identification (38%). - Vendor access is ubiquitous and prioritized over internal access.
88% of manufacturers authorize remote third-party access to OT environments to take care of a wide variety of functions, while only 54% allow internal employee access. 60% permit more than 100 external parties (vendors, contractors, suppliers, OEMs, etc.) to access these environments remotely. This astonishing scale of third-party access entails considerable risk exposure if proper security tools and policies are not in place. - Security best practices long used in IT settings are gaining traction in the OT realm.
69% have implemented multi-factor authentication (MFA), and 34% have initiated Zero Trust strategies, indicating a growing commitment to modern security architecture tailored for operational landscapes. - Compliance remains a key driver for secure remote adoption, especially in Europe.
The survey reveals a bidirectional relationship between SRA and compliance. Compliance is a strong catalyst for SRA adoption, particularly in EMEA, where cybersecurity mandates are more stringent. 30% of EMEA respondents cite regulatory requirements as a main driver for SRA implementation – compared to just 19% of North Americans. At the same time, SRA itself helps organizations to meet and sustain compliance obligations, with 42% reporting that SRA improves compliance.
The survey was commissioned by Cyolo and conducted by Takepoint Research across North America and EMEA with 535 qualified respondents – including CISOs, CIOs, OT security leads, operations managers, and plant engineers – and supported by analyst insights.