top of page
Hemsidan bild_edited.jpg

 Securing the network is not enough

Critical assets in IT & OT must 
be secured independently

SOLUTIONS

XertifiedRemote Access

Secure outside access to individual IT & OT assets

XertifiedHide & Protect

Hide key IT & OT assets from everyone and everything

LOCK & KEY APPROACH

Digital key

Digital locks

Client

image.png
image.png
image.png
image.png
image.png
image.png

ANY TYPE OF

NETORK

on Xertified hardware

on any hardware

on cloud platforms

image.png

WireGuard encryped tunnel

PKI identity

PKI identity

SECURE ANYTHING & ANYWERE

image.png

Use a desktop client, 
a jump-host or a secured device as key

1

Install Locks on relevant platforms

Secure any device 

image.png

3

image.png

4

image.png
image.png
image.png
image.png
image.png
image.png
image.png
image.png
image.png

Browser Client

Desktop Client

Device behind a XoT-Lock

image.png
image.png
image.png

Existing identity and authorisation resources

ANY TYPE OF

NETORK

image.png

Connect to existing

resources / systems

image.png

2

image.png
image.png
image.png
image.png
image.png
image.png

AN ACCESS POLICY IN 20 SECONDS

Without touching any underlying networks or the protected devices.

WHO

image.png

1

"Service technicians in Germany"

WHAT

image.png

2

WHERE

image.png

3

"X-ray machine CX4300"

“Hauptstraße 15 Berlin”

WHEN

image.png

4

image.png

"Every Thursday 

09:00-13:30"

USE CASES

image.png

REMOTE ACCESS FOR 3rd PARTIES

​

Enable suppliers to connect securely from remote locations to dedicated equipment on-premise, without increasing security risks for other devices.

image.png
image.png

WORK FROM REMOTE LOCATIONS

​

Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and key staff.
 

image.png
image.png

MINIMISE PATCHING AND UPGRADES

​

 

Hide critical devices and reduce patching with >90% (time and cost). Extend the economic lifespan of legacy equipment

image.png
image.png

STOP INTERNAL AND EXTERNAL THREATS

​

 

Hide all relevant IT, OT and IoT assets from everyone, including employees.  Only allow trusted users access to trusted devices.

image.png
image.png

SECURE SHARING OF RESOURCES

​

 

Critical resources can be securely shared between different organisations. Different rights for different users. Even dividing on when (time)

image.png
image.png

MANAGE NON-STATIONARY DEVICES

​

 

Keep IT or OT devices secure even when moving around regularly in or between static networks

image.png

WHY XERTIFIED AND XOT TECHNOLOGY

image.png

Designed, developed and manufactured in Sweden

image.png

Closing critical security-gaps  in IT & OT

image.png

Works for both legacy devices and new products

image.png

Fast implementation

& easy management

SUBSCRIBE

Be first to learn about product and Xertified updates!

Thanks for submitting!

Xertified

​

Xertified provides security solutions for a safe society and a resilient industry. 

By eliminating the possibility to interfere with connected devices, we close critical security gaps in IT, OT and IoT networks. 

Contact us

+46 (0)18 265 06 06

​

info@xertified.com

  • LinkedIn

Meet us

Commercial office

Vasagatan 12

SE-111 20 Stockholm

​​​​

R&D Office

Dragarbrunnsgatan 35

SE-753 20 Uppsala

bottom of page