# White Papers

1. [Home](https://www.agilicus.com/)
2. White Papers

![Agilicus AnyX platform features an intuitive interface with secure access, identity management, and policy enforcement for seamless digital transformation.](https://www.agilicus.com/www/46ec1472-agilicus-anyx-features.svg)WHITE PAPERS

---

## Zero Trust with Agilicus AnyX

Learn how organisations are using Agilicus AnyX to adopt Zero Trust. Read more about industry best practices with our white papers, and learn why the platform stands out when it comes to enhancing security with our brochures.

[CONTACT](/contact-us/)

[BOOK A MEETING](/book-calendar-meeting/)

## White Papers

- [![Industrial Cyber Security Best Practices](https://www.agilicus.com/www/1641c6ff-security-best-practices-guide.webp "Industrial Cyber Security Best Practices 1")](https://www.agilicus.com/white-papers/industrial-cyber-security-best-practices/)## [Industrial Cyber Security Best Practices](https://www.agilicus.com/white-papers/industrial-cyber-security-best-practices/)
    
    Best practices guide for cyber security practices in hybrid information and operational technology networks.
- [![Enabling NIS2 Compliance for VNC Remote Access in Industrial Control Systems](https://www.agilicus.com/www/4ea4e491-nis2-vnc-youtube-thumbnail-with-text-scaled.jpg "Enabling NIS2 Compliance for VNC Remote Access in Industrial Control Systems 2")](https://www.agilicus.com/white-papers/enabling-nis2-compliance-for-vnc-remote-access/)## [Enabling NIS2 Compliance for VNC Remote Access in Industrial Control Systems](https://www.agilicus.com/white-papers/enabling-nis2-compliance-for-vnc-remote-access/)
    
    Learn how to secure legacy factory screens and HMIs without replacing your existing architecture. Agilicus AnyX applies zero trust to legacy protocols, delivering multi-factor authentication seamlessly.
- [![Why traditional VPNs are the weak link in NERC CIP-003-9 compliance](https://www.agilicus.com/www/8cc2d6d2-rust-repairs-and-ransomware-slashing-mttr-without-the-vpn-dumpster-fire.webp "Why traditional VPNs are the weak link in NERC CIP-003-9 compliance 3")](https://www.agilicus.com/white-papers/why-traditional-vpns-are-the-weak-link-in-nerc-cip-003-9-compliance/)## [Why traditional VPNs are the weak link in NERC CIP-003-9 compliance](https://www.agilicus.com/white-papers/why-traditional-vpns-are-the-weak-link-in-nerc-cip-003-9-compliance/)
    
    Discover why legacy virtual private networks fail NERC CIP-003-9 standards and how zero trust provides a secure, invisible alternative for energy utilities.
- [![The energy utility’s guide to replacing VPNs for NERC CIP secure remote access](https://www.agilicus.com/www/a520e978-drowning-in-drives-secure-remote-scada-without-the-vpn-nightmare.webp "The energy utility’s guide to replacing VPNs for NERC CIP secure remote access 4")](https://www.agilicus.com/white-papers/the-energy-utilitys-guide-to-replacing-vpns-for-nerc-cip-secure-remote-access/)## [The energy utility’s guide to replacing VPNs for NERC CIP secure remote access](https://www.agilicus.com/white-papers/the-energy-utilitys-guide-to-replacing-vpns-for-nerc-cip-secure-remote-access/)
    
    A guide for energy utilities replacing VPNs. See how zero trust identity-aware proxies solve OT network complexity and ensure NERC CIP-003-9 compliance.
- [![The Fragility of Interdependence: Securing the Hyper-Specialised Supply Chain in the Age of Cyber-Physical Convergence](https://www.agilicus.com/www/7a824b82-fragility-of-interdependence-scaled.webp "The Fragility of Interdependence: Securing the Hyper-Specialised Supply Chain in the Age of Cyber-Physical Convergence 5")](https://www.agilicus.com/white-papers/the-fragility-of-interdependence-securing-the-hyper-specialised-supply-chain-in-the-age-of-cyber-physical-convergence/)## [The Fragility of Interdependence: Securing the Hyper-Specialised Supply Chain in the Age of Cyber-Physical Convergence](https://www.agilicus.com/white-papers/the-fragility-of-interdependence-securing-the-hyper-specialised-supply-chain-in-the-age-of-cyber-physical-convergence/)
    
    Hyper-specialised supply chains are fragile. Download this whitepaper to see how zero trust secures the industrial mesh against evolving cyber threats.
- [![Multi-Site Manufacturing](https://www.agilicus.com/www/75c7e825-manufacturing-floor.png "Multi-Site Manufacturing 6")](https://www.agilicus.com/white-papers/secure-connectivity-for-multi-site-manufacturing/)## [Multi-Site Manufacturing](https://www.agilicus.com/white-papers/secure-connectivity-for-multi-site-manufacturing/)
    
    Multi-site manufacturing requires seamless access. Discover how identity-based zero trust delivers secure connectivity for staff and contractors at every site.
- [![The Frictionless Factory: Solving the Connectivity Crisis in Hyper-Specialised](https://www.agilicus.com/www/0a7617b6-chain-gang-shared-fate.webp "The Frictionless Factory: Solving the Connectivity Crisis in Hyper-Specialised 7")](https://www.agilicus.com/white-papers/the-frictionless-factory-solving-the-connectivity-crisis-in-hyper-specialised/)## [The Frictionless Factory: Solving the Connectivity Crisis in Hyper-Specialised](https://www.agilicus.com/white-papers/the-frictionless-factory-solving-the-connectivity-crisis-in-hyper-specialised/)
    
    Solve the connectivity crisis in hyper-specialised factories. Decouple access from the network with Agilicus AnyX to eliminate VPN friction and cyber risk.
- [![Agilicus AnyX Configuration Security](https://www.agilicus.com/www/20da8365-configuration-security.png "Agilicus AnyX Configuration Security 8")](https://www.agilicus.com/white-papers/agilicus-anyx-configuration-security/)## [Agilicus AnyX Configuration Security](https://www.agilicus.com/white-papers/agilicus-anyx-configuration-security/)
    
    Is cloud configuration secure? Learn how Agilicus AnyX protects your settings and discover why it offers superior security compared to on-premise systems.
- [![How zero trust architecture secures critical energy infrastructure and satisfies NERC CIP](https://www.agilicus.com/www/d4bc58b8-water-infrastructure-security-navigating-state-mandates-and-zero-trust.webp "How zero trust architecture secures critical energy infrastructure and satisfies NERC CIP 9")](https://www.agilicus.com/white-papers/how-zero-trust-architecture-secures-critical-energy-infrastructure-and-satisfies-nerc-cip/)## [How zero trust architecture secures critical energy infrastructure and satisfies NERC CIP](https://www.agilicus.com/white-papers/how-zero-trust-architecture-secures-critical-energy-infrastructure-and-satisfies-nerc-cip/)
    
    Energy providers: satisfy NERC CIP-005 and CIP-003-9 with zero trust. Deliver unified authentication and precise authorisation without network changes.
- [![Secure remote access for energy utilities: Meeting NERC CIP standards without a VPN](https://www.agilicus.com/www/e34c6bf3-poland-distributed-energy-cyber-attack.webp "Secure remote access for energy utilities: Meeting NERC CIP standards without a VPN 10")](https://www.agilicus.com/white-papers/secure-remote-access-for-energy-utilities-meeting-nerc-cip-standards-without-a-vpn/)## [Secure remote access for energy utilities: Meeting NERC CIP standards without a VPN](https://www.agilicus.com/white-papers/secure-remote-access-for-energy-utilities-meeting-nerc-cip-standards-without-a-vpn/)
    
    Secure energy utility remote access without VPN headaches. Learn how identity-aware proxies ensure NERC CIP compliance for third-party vendors and OT networks.
- [![Simplified NERC CIP compliance for low-impact BES cyber assets](https://www.agilicus.com/www/be4463d4-electricity-square.svg "Simplified NERC CIP compliance for low-impact BES cyber assets 11")](https://www.agilicus.com/white-papers/simplified-nerc-cip-compliance-for-low-impact-bes-cyber-assets/)## [Simplified NERC CIP compliance for low-impact BES cyber assets](https://www.agilicus.com/white-papers/simplified-nerc-cip-compliance-for-low-impact-bes-cyber-assets/)
    
    Meet NERC CIP-003-9 requirements for low-impact BES assets. Agilicus AnyX delivers seamless multi-factor authentication without complex network configuration.
- [![NERC CIP-003-9: Automating access control and authorisation for remote power sites](https://www.agilicus.com/www/c4d14913-flush-the-friction-secure-remote-operations-for-water-systems.webp "NERC CIP-003-9: Automating access control and authorisation for remote power sites 12")](https://www.agilicus.com/white-papers/nerc-cip-003-9-automating-access-control-and-authorisation-for-remote-power-sites/)## [NERC CIP-003-9: Automating access control and authorisation for remote power sites](https://www.agilicus.com/white-papers/nerc-cip-003-9-automating-access-control-and-authorisation-for-remote-power-sites/)
    
    Automate access control for remote power sites. Replace manual processes and legacy VPNs with agile zero trust to meet NERC CIP-003-9 requirements efficiently.
- [![NERC CIP-003-9 and the shift to multi-factor authentication](https://www.agilicus.com/www/ee8962ee-nerccip0039whyyourvpnisacompliancedumpsterfire.webp "NERC CIP-003-9 and the shift to multi-factor authentication 13")](https://www.agilicus.com/white-papers/nerc-cip-003-9-and-the-shift-to-multi-factor-authentication/)## [NERC CIP-003-9 and the shift to multi-factor authentication](https://www.agilicus.com/white-papers/nerc-cip-003-9-and-the-shift-to-multi-factor-authentication/)
    
    Energy utilities: secure low-impact systems with multi-factor authentication. Discover how zero trust enables NERC CIP-003-9 compliance for legacy OT.
- [![NERC CIP-003-9 – Legacy Remote Access Tools are Not Sufficient](https://www.agilicus.com/www/67e33e6c-nerc-cip-003-9-featured-image.png "NERC CIP-003-9 - Legacy Remote Access Tools are Not Sufficient 14")](https://www.agilicus.com/white-papers/nerc-cip-003-9-legacy-remote-access-tools-are-not-sufficient/)## [NERC CIP-003-9 – Legacy Remote Access Tools are Not Sufficient](https://www.agilicus.com/white-papers/nerc-cip-003-9-legacy-remote-access-tools-are-not-sufficient/)
    
    On April 1, 2026, CIP-003-9: Cyber Security - Security Management Controls will become enforceable. Meet those requirements with a Zero Trust platform.
- [![VPNs: Complex, non-compliant, and lacking security for modern remote access](https://www.agilicus.com/www/4ef8b756-vpn-hacker.jpeg "VPNs: Complex, non-compliant, and lacking security for modern remote access 15")](https://www.agilicus.com/white-papers/vpns-complex-non-compliant-and-lacking-security-for-modern-remote-access/)## [VPNs: Complex, non-compliant, and lacking security for modern remote access](https://www.agilicus.com/white-papers/vpns-complex-non-compliant-and-lacking-security-for-modern-remote-access/)
    
    VPNs are no longer sufficient for modern security. Explore why traditional remote access fails to meet compliance and how zero trust provides a safer foundation.
- [![Securing the Distributed Supply Chain: Why Identity is the New Air Gap](https://www.agilicus.com/www/94ad6369-perimeter.webp "Securing the Distributed Supply Chain: Why Identity is the New Air Gap 16")](https://www.agilicus.com/white-papers/securing-the-distributed-supply-chain-why-identity-is-the-new-air-gap/)## [Securing the Distributed Supply Chain: Why Identity is the New Air Gap](https://www.agilicus.com/white-papers/securing-the-distributed-supply-chain-why-identity-is-the-new-air-gap/)
    
    Secure the distributed supply chain in Industry 4.0. Learn why zero trust architecture makes identity the new air gap for complex manufacturing ecosystems.
- [![Secure Remote Updates For Air-Gapped Systems](https://www.agilicus.com/www/9a0ed6f8-factory-floor.jpg "Secure Remote Updates For Air-Gapped Systems 17")](https://www.agilicus.com/white-papers/secure-remote-updates-for-air-gapped-systems/)## [Secure Remote Updates For Air-Gapped Systems](https://www.agilicus.com/white-papers/secure-remote-updates-for-air-gapped-systems/)
    
    Challenges with, and solutions for, Secure Remote Updates in modern complex control systems deployed in locked-down, air-gap-style networks. Agilicus AnyX enables and secures remote updates for air gaps.
- [![High Availability Dual WAN Remote Industrial Connectivity](https://www.agilicus.com/www/b5034e40-industry-4.0-worldwide.png "High Availability Dual WAN Remote Industrial Connectivity 18")](https://www.agilicus.com/white-papers/high-availability-dual-wan-remote-industrial-connectivity/)## [High Availability Dual WAN Remote Industrial Connectivity](https://www.agilicus.com/white-papers/high-availability-dual-wan-remote-industrial-connectivity/)
    
    Industry cannot stop. Industry is also commonly located in remote areas with less network connectivity choices. Learn how Agilicus AnyX facilitates High Availability Dual WAN Remote Industrial Connectivity.
- [![Subscription Model and Remote Access In Industrial Control](https://www.agilicus.com/www/a1514bcf-industry-4.0.png "Subscription Model and Remote Access In Industrial Control 19")](https://www.agilicus.com/white-papers/subscription-model-and-remote-access-in-industrial-control/)## [Subscription Model and Remote Access In Industrial Control](https://www.agilicus.com/white-papers/subscription-model-and-remote-access-in-industrial-control/)
    
    Subscription Model and Remote Access In Industrial Control. The quest for revenue creates risks for operation.
- [![Merging Local Identity With Online Identity](https://www.agilicus.com/www/5c3021c0-plant-datacentre.png "Merging Local Identity With Online Identity 20")](https://www.agilicus.com/white-papers/merging-local-identity-with-online-identity/)## [Merging Local Identity With Online Identity](https://www.agilicus.com/white-papers/merging-local-identity-with-online-identity/)
    
    Modern online Identity with Azure, Google, Okta. Manufacturing plants with Local Identity -- onsite users Unify with Agilicus AnyX
- [![NIST SP 800 53 Mapping To Zero Trust](https://www.agilicus.com/www/8f66015b-controls-e1681162736332.png "NIST SP 800 53 Mapping To Zero Trust 21")](https://www.agilicus.com/white-papers/nist-sp-800-53-mapping-to-zero-trust/)## [NIST SP 800 53 Mapping To Zero Trust](https://www.agilicus.com/white-papers/nist-sp-800-53-mapping-to-zero-trust/)
    
    NIST SP 800 53 Mapping To Zero Trust. NIST SP 800 53 is a comprehensive set of security controls. Zero Trust Network Architecture is a technology. Explore the intersection.
- [![NIST SP 800-53 in Critical Infrastructure](https://www.agilicus.com/www/87655a6b-east-west-vpn.png "NIST SP 800-53 in Critical Infrastructure 22")](https://www.agilicus.com/white-papers/nist-sp-800-53-in-critical-infrastructure/)## [NIST SP 800-53 in Critical Infrastructure](https://www.agilicus.com/white-papers/nist-sp-800-53-in-critical-infrastructure/)
    
    NIST SP 800-53 is a core part of the NIST cybersecurity framework. It provides mappings of controls to various other standards. Zero Trust is a complementary architecutre supporting these controls.
- [![Zero Trust Air Gap Lock Down Inbound and Outbound](https://www.agilicus.com/www/d5df9c1f-outbound-only.png "Zero Trust Air Gap Lock Down Inbound and Outbound 23")](https://www.agilicus.com/white-papers/zero-trust-air-gap-lockdown-inbound-and-outbound/)## [Zero Trust Air Gap Lock Down Inbound and Outbound](https://www.agilicus.com/white-papers/zero-trust-air-gap-lockdown-inbound-and-outbound/)
    
    Air Gaps are a useful but inconvenient tactic as a part of a defense in depth strategy. Learn how a Zero Trust Air Gap Lockdown Inbound and Outbound can provide convenience and security together.
- [![Piercing The Purdue Model: Zero-Trust In Operational Technology](https://www.agilicus.com/www/eb5baf3e-operational-technology.png "Piercing The Purdue Model: Zero-Trust In Operational Technology 24")](https://www.agilicus.com/white-papers/piercing-the-purdue-model-zero-trust-in-operational-technology/)## [Piercing The Purdue Model: Zero-Trust In Operational Technology](https://www.agilicus.com/white-papers/piercing-the-purdue-model-zero-trust-in-operational-technology/)
    
    Unravelling the interaction between the Purdue Model and Zero Trust: When married together in operational technology, the outcomes can be transformative.
- [![Multi-Factor Authentication On The Internal Network](https://www.agilicus.com/www/87655a6b-east-west-vpn.png "Multi-Factor Authentication On The Internal Network 25")](https://www.agilicus.com/white-papers/multi-factor-authentication-on-the-internal-network/)## [Multi-Factor Authentication On The Internal Network](https://www.agilicus.com/white-papers/multi-factor-authentication-on-the-internal-network/)
    
    Cyber-Insurance compliance require multi-factor on internal network resources? Routers? Servers? Learn how to implement without a VPN, without changes.
- [![Industrial Zero-Trust Micro-Segmentation](https://www.agilicus.com/www/fdba5cd6-zones.png "Industrial Zero-Trust Micro-Segmentation 26")](https://www.agilicus.com/white-papers/zero-trust-microsegmentation/)## [Industrial Zero-Trust Micro-Segmentation](https://www.agilicus.com/white-papers/zero-trust-microsegmentation/)
    
    Micro-Segmentation Zones are a best practice for Industrial Control security. Simplify and increase effectivity with identity-based Zero-Trust. Industrial Zero-Trust Micro-Segmentation
- [![Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture](https://www.agilicus.com/www/0f788a82-whitepaper-cyber-threats.png "Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture 27")](https://www.agilicus.com/white-papers/protect-against-cyber-threats-zero-trust/)## [Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture](https://www.agilicus.com/white-papers/protect-against-cyber-threats-zero-trust/)
    
    Eliminate Attack Vectors and Stop Cyber Threats in Their Tracks with a Zero Trust Architecture. Cyber threats come from all angles these days, yet most businesses are still ill equipped to properly keep the bad actors out.
- [![Remote Desktop Access: Managing Cyber Risk with Zero Trust Network Access](https://www.agilicus.com/www/eb29b507-remote-desktop-style.png "Remote Desktop Access: Managing Cyber Risk with Zero Trust Network Access 28")](https://www.agilicus.com/white-papers/remote-desktop-access-managing-cyber-risk-with-modern-security-systems/)## [Remote Desktop Access: Managing Cyber Risk with Zero Trust Network Access](https://www.agilicus.com/white-papers/remote-desktop-access-managing-cyber-risk-with-modern-security-systems/)
    
    Eliminate unmanaged cyber risk by securing remote desktop access through zero trust network access and improve your cybersecurity posture.
- [![Azure Application Consent](https://www.agilicus.com/www/934da57e-azure-app-registration-consent.png "Azure Application Consent 29")](https://www.agilicus.com/white-papers/azure-application-consent/)## [Azure Application Consent](https://www.agilicus.com/white-papers/azure-application-consent/)
    
    The Agilicus AnyX platform uses external Identity Providers rather than creating 'parallel' identities for users to remember. What permissions are being granted on those upstream systems?
- [![Starlink Port Forwarding](https://www.agilicus.com/www/e514bc3e-sat.png "Starlink Port Forwarding 30")](https://www.agilicus.com/white-papers/starlink-port-forwarding/)## [Starlink Port Forwarding](https://www.agilicus.com/white-papers/starlink-port-forwarding/)
    
    Starlink. Good enough except for starlink port forwarding. Reach your devices from remote with Agilicus, securely, simply, reliably.