WHITE PAPERS
Zero Trust with Agilicus AnyX
Learn how organisations are using Agilicus AnyX to adopt Zero Trust. Read more about industry best practices with our white papers, and learn why the platform stands out when it comes to enhancing security with our brochures.
White Papers
-

Enabling NIS2 Compliance for VNC Remote Access in Industrial Control Systems
The NIS2 Directive mandates strict cybersecurity for critical infrastructure. Learn how Agilicus AnyX enables NIS2 compliance for existing VNC remote access. Secure industrial control systems using multi-factor authentication, single sign-on, and precise authorisation, all without complex network changes or virtual private networks.
-

Why traditional VPNs are the weak link in NERC CIP-003-9 compliance
As energy utilities race to meet NERC CIP-003-9 compliance for low-impact assets, many rely on the familiar virtual private network. This whitepaper explores why expanding legacy VPNs amplifies cyber risk, introduces severe operational friction, and falls short of modern compliance standards—and how zero trust offers a secure, invisible alternative.
-

The energy utility’s guide to replacing VPNs for NERC CIP secure remote access
A comprehensive guide for energy utilities looking to replace legacy virtual private networks. Discover how a zero trust identity-aware proxy solves the challenges of complex OT networks, secures third-party remote access, and ensures compliance with strict NERC CIP regulations like CIP-003-9.
-

The Fragility of Interdependence: Securing the Hyper-Specialised Supply Chain in the Age of Cyber-Physical Convergence
The £1.9bn JLR breach exposed supply chain fragility. Download the Agilicus whitepaper to learn how Zero Trust secures the industrial mesh against cyber threats.
-

Multi-Site Manufacturing
The transition to multi-site manufacturing and industry 4.0 requires a remote access solution that delivers seamless, identity-based access for every site and contractor.
-

The Frictionless Factory: Solving the Connectivity Crisis in Hyper-Specialised
Is your VPN architecture killing your Mean Time To Repair? In the era of the hyper-specialized supply chain, legacy VPNs create operational drag and dangerous “Shared Fate” risks—as proven by the massive Fall 2025 Jaguar Land Rover outage. This whitepaper explains why modern manufacturers are abandoning Layer-3 VPNs for Agilicus AnyX. Discover how the “Island Architecture” delivers instant, clientless access to third-party experts, ensuring your production line stays up even when your supplier goes down. Read the full whitepaper to…
-

Agilicus AnyX Configuration Security
Cloud Configuration: What is the exposure? How is it protected? Learn how Agilicus AnyX is more secure than an on-premise system.
-

How zero trust architecture secures critical energy infrastructure and satisfies NERC CIP
Energy providers face mounting pressure to align their defence-in-depth strategies with modern zero trust principles. Learn how the Agilicus AnyX platform satisfies NERC CIP standards, including CIP-005 and CIP-003-9, by delivering unified authentication, precise authorisation, and seamless access—all without requiring complex network architecture changes. Be simple, compliant, secure, and fast.
-

Securing the Distributed Supply Chain: Why Identity is the New Air Gap
The manufacturing landscape has transformed into a complex, distributed supply chain, yet security models remain dangerously outdated. This article exposes the critical friction points of Industry 4.0, revealing how legacy access methods create unacceptable risks. Learn why a Zero Trust Architecture, prioritizing identity, is the imperative solution for securing this interconnected world, making identity the new air gap.
-
Simplified NERC CIP compliance for low-impact BES cyber assets
With NERC CIP-003-9 extending strict access controls to low-impact BES cyber assets by April 2026, energy providers face a massive compliance hurdle. Discover how Agilicus AnyX delivers seamless multi-factor authentication for third-party vendors without requiring network changes or complex configuration. Be compliant, be quick, be simple.
-

Secure remote access for energy utilities: Meeting NERC CIP standards without a VPN
Energy utilities face growing pressure to secure remote access and meet NERC CIP standards. Discover why traditional virtual private networks struggle with complex networks and third-party vendors, and how a zero trust identity-aware proxy delivers seamless, precise, and compliant access without the VPN headaches.
-

NERC CIP-003-9: Automating access control and authorisation for remote power sites
Managing remote access for distributed power sites is historically manual, slow, and error-prone. Learn how automating access control and precise authorisation with Agilicus AnyX helps energy utilities meet NERC CIP-003-9 requirements efficiently, replacing legacy VPNs with an agile zero trust architecture.
-

NERC CIP-003-9 and the shift to multi-factor authentication
With the April 2026 enforcement of NERC CIP-003-9, utilities face a new challenge: securing low-impact systems with multi-factor authentication. Discover why legacy operational technology cannot natively support these mandates, why virtual private networks fall short, and how zero trust architecture offers a compliance path without ripping out perfectly functional infrastructure.
-

NERC CIP-003-9 – Legacy Remote Access Tools are Not Sufficient
On April 1, 2026, CIP-003-9: Cyber Security – Security Management Controls will become enforceable. Meet those requirements with a Zero Trust platform.
-

VPNs: Complex, non-compliant, and lacking security for modern remote access
VPNs were once the go-to remote access solution but prove to be an insufficient foundation for secure remote access in today’s landscape
-

Secure Remote Updates For Air-Gapped Systems
Challenges with, and solutions for, Secure Remote Updates in modern complex control systems deployed in locked-down, air-gap-style networks. Agilicus AnyX enables and secures remote updates for air gaps.
-

High Availability Dual WAN Remote Industrial Connectivity
Industry cannot stop. Industry is also commonly located in remote areas with less network connectivity choices. Learn how Agilicus AnyX facilitates High Availability Dual WAN Remote Industrial Connectivity.
-

Subscription Model and Remote Access In Industrial Control
Subscription Model and Remote Access In Industrial Control. The quest for revenue creates risks for operation.
-

Merging Local Identity With Online Identity
Modern online Identity with Azure, Google, Okta. Manufacturing plants with Local Identity — onsite users Unify with Agilicus AnyX
-

NIST SP 800 53 Mapping To Zero Trust
NIST SP 800 53 Mapping To Zero Trust. NIST SP 800 53 is a comprehensive set of security controls. Zero Trust Network Architecture is a technology. Explore the intersection.
-

NIST SP 800-53 in Critical Infrastructure
NIST SP 800-53 is a core part of the NIST cybersecurity framework. It provides mappings of controls to various other standards. Zero Trust is a complementary architecutre supporting these controls.
-

Zero Trust Air Gap Lock Down Inbound and Outbound
Air Gaps are a useful but inconvenient tactic as a part of a defense in depth strategy. Learn how a Zero Trust Air Gap Lockdown Inbound and Outbound can provide convenience and security together.
-

Piercing The Purdue Model: Zero-Trust In Operational Technology
Unravelling the interaction between the Purdue Model and Zero Trust: When married together in operational technology, the outcomes can be transformative.
-

Multi-Factor Authentication On The Internal Network
Cyber-Insurance compliance require multi-factor on internal network resources? Routers? Servers? Learn how to implement without a VPN, without changes.
-

Industrial Zero-Trust Micro-Segmentation
Micro-Segmentation Zones are a best practice for Industrial Control security. Simplify and increase effectivity with identity-based Zero-Trust. Industrial Zero-Trust Micro-Segmentation
-

Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture
Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture. Cyber threats come from all angles these days, yet most businesses are still ill equipped to properly keep the bad actors out.
-

Remote Desktop Access: Managing Cyber Risk with Zero Trust Network Access
Eliminate unmanaged cyber risk by securing remote desktop access through zero trust network access and improve your cybersecurity posture.
-

Azure Application Consent
The Agilicus AnyX platform uses external Identity Providers rather than creating ‘parallel’ identities for users to remember. What permissions are being granted on those upstream systems?
-

Starlink Port Forwarding
Starlink. Good enough except for starlink port forwarding. Reach your devices from remote with Agilicus, securely, simply, reliably.