The Multi-Site Problem
A single manufacturing plant with 200 OT devices is a security project. A company with 50 plants across 12 countries, each with different network topologies, equipment vintages, and local IT capabilities, is an architecture problem.
The challenges are structural:
- Policy consistency: The same vendor should have the same access restrictions at every site. In practice, each site configures its own firewall rules, VPN tunnels, and access lists independently.
- Visibility: The central security team cannot see who is accessing what at Site 37. Each site has its own logs, its own formats, its own retention policies.
- Staffing: Most remote sites have zero dedicated security staff. A water treatment plant with 3 operators does not have a security engineer. A substation has no on-site IT at all.
- Network diversity: Site A has a modern segmented network. Site B has a flat Layer 2 network from 2008. Site C is air-gapped. A security architecture that requires uniform network infrastructure will never deploy.
- Deployment speed: If adding a new site takes 6 weeks of on-site configuration, the security program will never catch up with business expansion.
The Traditional Approach (and Why It Fails)
Most organizations attempt multi-site OT security by replicating the same per-site deployment at each location:
- Deploy firewalls at each site
- Configure site-specific rules
- Set up VPN tunnels for remote access
- Install jump hosts for vendor access
- Configure local logging
- Repeat 50 times
This approach has predictable failure modes:
- Configuration drift: By month 6, no two sites have the same firewall rules. Policies diverge as local teams make exceptions and adjustments.
- No central visibility: Logs exist at each site, but nobody aggregates or correlates them. A vendor accessing 5 sites in one day is invisible to the central team.
- Slow incident response: When an incident occurs at Site 23, the central team needs VPN access to the site, familiarity with the local configuration, and access to local logs. Response time is measured in hours or days, not minutes.
- Unsustainable cost: Each site needs firewall licenses, VPN concentrators, jump hosts, logging infrastructure, and periodic on-site configuration. At 50+ sites, this becomes a multi-million-dollar recurring cost.
The Centralized Overlay Architecture
The alternative is a centralized policy, distributed enforcement model. The architecture has three components:
- Central management plane: A single policy engine where the security team defines all access rules, user permissions, and compliance requirements.
- Distributed enforcement at each site: A lightweight appliance or VM at each location that enforces policy locally, mediates all access, and records sessions.
- Encrypted overlay network: A secure, software-defined network connecting all sites to the central management plane without requiring changes to the underlying network infrastructure.
This is the pattern the Access Gate implements. Here is how it works in practice.
Deployment: What Happens at Each Site
Day 0: Ship the Appliance
The central team configures an Access Gate appliance (or prepares a VM image) with the site's baseline policy. The appliance ships to the site.
Day 1: Connect and Register
On-site staff (an operator, a plant manager, anyone who can plug in an Ethernet cable) connects the appliance to the local network. The appliance:
- Obtains a network address
- Establishes an encrypted tunnel to the central management plane
- Registers itself and pulls the latest policy configuration
- Begins discovering local network assets
No firewall reconfiguration. No VLAN changes. No on-site security expertise required.
Day 2: Enforce and Record
The appliance is live. All access to OT assets at this site now routes through the local Access Gate. The central team can:
- See all sessions at this site in the central dashboard
- Push policy updates that take effect immediately
- Review session recordings
- Receive alerts for policy violations
Total deployment time per site: 1-2 days, most of which is shipping time. Compare this to the 4-6 weeks typical for a traditional firewall and VPN deployment.
Day 2 Operations for the Central Team
Once sites are deployed, the central security team manages everything from one place.
Adding New Sites
- Configure the new site's baseline policy (copy from a template, adjust for site-specific assets)
- Ship the appliance
- Remote staff plugs it in
- Site appears in the central dashboard within minutes
Updating Policies
A policy change (e.g., "all vendor sessions require MFA and session recording") propagates to every site simultaneously. No site visits. No per-site configuration. The change takes effect at all 50+ locations within minutes.
Investigating Incidents
When an alert fires at Site 23:
- The central team sees the alert in the unified dashboard
- They pull the session recording immediately, no VPN required
- They review exactly what happened: who connected, what protocol, what commands
- They can revoke the user's access across all sites with a single action
Compliance Reporting
Generate a single compliance report covering all sites. The report shows:
- Total sessions by site, user, and protocol
- Policy violations and remediation actions
- Session recording coverage (percentage of OT access paths recorded)
- User access patterns across sites
One report, all sites, ready for the auditor.
Comparison: Per-Site Deployment vs. Centralized Overlay
| Factor | Per-Site Deployment | Centralized Overlay |
|---|---|---|
| Deployment time per site | 4-6 weeks (firewall, VPN, jump host, logging) | 1-2 days (ship appliance, plug in) |
| Policy consistency | Manual per-site configuration; drift is inevitable | Single policy engine; all sites enforced identically |
| Central visibility | Requires log aggregation project; often incomplete | Built-in; all sessions visible in central dashboard |
| Staffing per site | Needs local IT/security resource for maintenance | Zero; managed entirely from central team |
| Cost per site | $50K-150K+ (hardware, licenses, labor) | Single appliance/VM; fraction of traditional cost |
| Time to push policy change | Days to weeks (coordinate with each site) | Minutes (automatic propagation) |
| Incident response time | Hours to days (need site access, local log review) | Minutes (central dashboard, instant session replay) |
| Network changes required | Yes (firewall rules, VLANs, VPN tunnels) | No (overlay sits on top of existing network) |
| Scales to 200+ sites | Impractical without large dedicated team | Linear; each site is identical from management perspective |
What This Means for Different Industries
Manufacturing (10-200 plants)
Each plant has different equipment, different vintages, different network setups. The overlay approach treats each plant as a policy enforcement point. The central team defines role-based access (maintenance engineer, vendor, operator) and the policy applies uniformly regardless of what the plant's network looks like underneath.
Utilities (substations, treatment plants, pump stations)
Dozens or hundreds of unmanned remote sites. No on-site IT. The appliance ships, plugs in, and connects. The central team has visibility into every session at every substation without maintaining VPN tunnels to each location. See how this works in practice for power grid substations and ski resorts with 55+ distributed lift stations.
Defense and Aerospace (multiple facilities, strict compliance)
CMMC requires consistent controls across all facilities handling CUI. A centralized overlay ensures every facility meets the same audit standard, with session recording and access logs generated uniformly across all sites.
Retail and Distribution (warehouses, distribution centers)
High site count, low complexity per site, zero security staff on location. The appliance model was designed for this: ship, plug in, manage remotely.
Scaling Principles
Three architectural principles make multi-site zero trust practical:
- Policy lives in one place. Every access rule, every user permission, every compliance requirement is defined once and enforced everywhere. Configuration drift becomes impossible.
- Enforcement is local. The appliance at each site handles all mediation locally. If the connection to the central management plane is interrupted, local enforcement continues with the last-known policy. No single point of failure.
- The overlay is independent of the underlay. It does not matter whether the site has an unsegmented network, a segmented network, or an air-gapped network. The overlay creates a consistent security layer on top of whatever exists. For a detailed comparison of this overlay approach versus traditional VLANs, see overlay networking vs VLANs for OT segmentation.
Multi-site OT security is not a deployment problem. It is an architecture choice. Deploy the right pattern once, and every additional site is a one-day operation instead of a six-week project.
For more Zero Trust OT resources, architecture guides, and comparisons, visit the Zero Trust for OT Networks hub.

