Xona Systems today announced Platform v5.5, a secure access solution designed to address the convergence of escalating threats, tightening regulatory requirements, and operational realities that legacy VPN and jump server architectures were never built to handle.
Critical infrastructure operators are navigating a fundamentally changed threat landscape in 2026. Nation-state actors are increasingly targeting industrial control systems through remote access vectors, while regulatory frameworks, including NERC CIP, IEC 62443, and TSA SD2 demand demonstrable governance over who accesses critical systems and under what conditions. At the same time, the operational reality of critical infrastructure (offshore platforms, rural substations, bandwidth-constrained sites) requires access solutions that maintain security and auditability even when network conditions degrade. Industry surveys¹ show remote access paths remain a primary driver of OT security incidents, yet many organizations still rely on VPN and jump server tools designed for stable IT networks, not operational technology environments.
Access That Survives Network Disruptions
Critical infrastructure often operates in conditions where traditional remote access tools fail: intermittent connectivity on offshore platforms, bandwidth constraints at rural substations, or air-gapped industrial facilities. Platform v5.5 introduces Session Hold and RDP Auto-Reconnect capabilities that maintain session continuity through network interruptions, allowing operators to continue critical work without losing progress or reauthenticating. This resilience eliminates the gap between security policy and operational reality that has long plagued OT environments, ensuring security controls don’t create incentives for operators to find workarounds during critical moments.
Critical infrastructure environments routinely operate under conditions that undermine assumptions embedded in traditional remote access architectures. Offshore platforms experience intermittent and high-latency connectivity, rural substations face persistent bandwidth constraints, and many industrial sites remain partially or fully air-gapped. In these contexts, conventional VPN- and session-based access tools—designed for stable enterprise IT networks—often fail to maintain session integrity during transient network disruptions, resulting in forced disconnects, loss of operational state, and repeated reauthentication.
Platform v5.5 addresses these constraints through the introduction of Session Hold and RDP Auto-Reconnect capabilities, which preserve session state across temporary connectivity loss without exposing underlying OT assets or expanding the attack surface. These mechanisms are complemented by configurable time synchronization services, enhanced CLI tooling for constrained or disconnected environments, and hardened FIPS-compliant cryptographic behavior to support diverse deployment and regulatory requirements.
By maintaining session continuity and operational context through network interruptions, operators are able to complete time-sensitive maintenance and response activities without restarting workflows or bypassing security controls. This resilience directly mitigates a long-standing tension in OT environments, where security mechanisms that impede operational continuity often incentivize informal workarounds during critical events. Aligning access security with real-world industrial operating conditions ensures that enforcement of security policy does not degrade availability, safety, or response effectiveness—particularly in high-risk, high-consequence scenarios.
Unified Governance Across Distributed Operations
Platform v5.5 expands the Xona Centralizer into a true single-pane-of-glass for secure access governance. Teams can now centrally manage connection and folder structures, session recordings and playback exports, real-time logs and bandwidth metrics, integration syncs with Forescout, Nozomi Networks, and other OT security platforms, and security policy settings that are enforced across all connected Xona Gateways. This full-spectrum visibility gives organizations the ability to scale secure access across global operations without scaling risk, complexity, or oversight burden. Rather than fragmented site-by-site management, teams gain a common, authoritative view that remains enforceable even when connectivity is unstable or bandwidth is constrained, ensuring access remains visible and accountable during the moments that matter most.
Built for How Critical Infrastructure Actually Operates
Platform v5.5 supports the workflows that define critical infrastructure operations. Users can now run multiple concurrent RDP, SSH, and Web sessions, switching between or collaborating across live troubleshooting efforts without interruption. An upgraded session transfer workflow enables secure handoffs between users during shift changes or escalation events, critical for 24/7 operations and remote OEM collaboration. Enhanced audit controls provide the visibility and evidence needed to demonstrate compliance without adding operational burden to security and engineering teams.
“In critical infrastructure, remote access is no longer just about getting connected, it’s about maintaining control under pressure,” said Raed Albuliwi, Chief Product Officer at Xona. “Access models that only work when networks are stable or environments are simple don’t hold up in critical infrastructure. Operators need governance that holds up in the field, not just on paper. That’s exactly what our next-generation access platform delivers.”
Market Traction
Deployed across more than 40 countries in energy, utilities, manufacturing, and maritime sectors, Xona has established itself as the secure access platform purpose-built for critical infrastructure. Cybersecurity ecosystem partners such as Forescout and Radiflow are working with Xona to replace vulnerable legacy remote access infrastructure.
Availability
As threats, regulations, and operational complexity continue to converge, secure remote access has become one of the most scrutinized control points in critical infrastructure security. Xona Platform v5.5 represents a shift from access that only connects to access that governs, from tools that work in ideal conditions to infrastructure that holds up when it matters most.
Xona Platform v5.5 is available now. Organizations seeking to modernize critical infrastructure remote access can learn more at www.xonasystems.com or schedule a demo.
[1] SANS Institute 2025 survey, “SANS Institute 2025 survey finds OT cybersecurity incidents rising as ransomware and remote access risks grow,” Industrial Cyber, November 20, 2025. Available at: https://industrialcyber.co/news/sans-institute-2025-survey-finds-ot-cybersecurity-incidents-rising-as-ransomware-and-remote-access-risks-grow/

Potpie AI raises $2.2 million to make AI agents usable inside real-world engineering systems
Posted in Commentary with tags Potpie on February 23, 2026 by itnerdSoftware teams are moving faster than ever, yet the systems they build and maintain were never designed for AI agents to operate inside them. Codebases span millions of lines, context is scattered across dozens of tools, and critical knowledge lives in the heads of a few senior engineers. Potpie was built to change that. Today, the company announced a $2.2 million pre-seed round to help engineering teams unify context across their entire stack and make AI agents genuinely useful in complex software environments.
The round was led by Emergent Ventures with participation from All In Capital, DeVC and Point One Capital. The capital will be used to support early enterprise deployments, expand the engineering team, and continue building Potpie’s core context and agent infrastructure.
As generative AI adoption accelerates, most tools focus on surface-level code generation while ignoring the deeper problem of context. Large language models are powerful, but without access to system-level understanding, tooling history, and architectural intent, they struggle in real production environments. Traditional approaches rely on senior engineers to manually hold this context together, a model that breaks down at scale and fails entirely when AI agents are introduced.
Potpie addresses this by unifying context across the entire engineering stack and enabling spec driven development. It pulls in information from source code, tickets, logs, documentation, and reviews, links it together, and makes it usable by agents.
With Potpie, the spec becomes the source of truth. Agents plan the feature end to end first by turning requirements into a clear implementation plan, mapping dependencies and edge cases, and aligning tests and rollout steps before writing a single line of code. The principle is simple. An agent is only as effective as the information it can access and the tools it can use. Potpie focuses on both.
The platform enables teams to automate high-impact and non trivial use cases across the software development lifecycle, like debugging cross-service failures, maintaining and writing end-to-end tests, blast radius detection and system design. It is designed for enterprise companies with large and complex codebases, starting at around one million lines of code and scaling to hundreds of millions. Rather than acting as another coding assistant, Potpie builds a graphical representation of software systems, infers behavior and patterns across modules, and creates structured artifacts that allow agents to operate consistently and safely.
Potpie also actively creates context as systems evolve. When pull requests are created, it can update documentation and tickets automatically. When tickets are opened, it can generate system designs. The platform automatically generates structured behavior definitions for each AI agent, outlining how they should operate within a specific codebase. At the same time, it builds a searchable, tagged index across APIs, services, databases, and components, narrowing the search space and significantly improving reliability.
The company was founded by Aditi Kothari and Dhiren Mathur, who began working on the problem in October 2023, at the start of the first wave of generative AI adoption. While much of the industry focused on knowledge workers, they saw that developers faced a fundamentally different challenge. Code is non-linear, deeply interconnected, and spread across large systems. They spent nearly two years building the foundational layer that understands codebases and creates the underlying knowledge graph, before launching Potpie publicly last year in January 2025
Early deployments reflect the scale of the problem Potpie is addressing. One customer with a codebase exceeding 40 million lines reduced root cause analysis for production issues from nearly a week to around 30 minutes, with engineers acting as reviewers instead of investigators. Another customer maintaining decades-old systems used Potpie to update and generate tests in the background, compressing work that previously took multiple sprints into a much shorter cycle.
Potpie currently works with Fortune 500 and publicly listed companies in regulated industries, including healthcare and insurtech. Its open-source projects have surpassed 5,000 stars on GitHub, creating a strong magnet for enterprise adoption.
Leave a comment »