
Network security is not enough
Critical assets in IT & OT must
be secured independently
Solutions
Secure outside access to individual IT & OT assets
Hide key IT & OT assets from everyone and everything
Lock & key approach
Digital key
Access policies
Digital locks






ANY TYPE OF
NETORK
on Xertified hardware
on any hardware
on cloud platforms

WireGuard encryped tunnel
PKI identity
PKI identity
-
Network independent security
-
Device independent security
-
No configuration of protected devices
-
Secure any device within minutes
-
Brings undeniable digital identities to legacy systems and new devices
-
Identities based on PKI/X.509
-
Full end-to-end encryption (using Wire Guard)
Secure anything and anywhere!
1. Use key to connect network
2. Connect exising assets
3. Install Locks on platforms
4. Secure any device









Browser Client
Desktop Client
Device behind a XoT-Lock



Server that integrates to your identity and security services
ANY TYPE OF
NETORK






Create an access policy
Without touching any underlying network or device.
1. WHO

"Service technicians in Germany"
2. WHAT

3. WHERE

"X-ray machine CX4300"
“Hauptstraße 15 Berlin”
4. WHEN

"Every Thursday
09:00-13:30"
Use cases
Remote access for 3rd parties
Enable suppliers to connect securely from remote locations to dedicated equipment on-premise.

Work from
remote location
Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and consultants.

Why Xertified and XoT Technology?
Designed, developed and manufactured in Sweden. Backed by the Swedish industry investors.

Works for IT, OT & IoT devices. Anywhere.

Solving a critical security gap. Without touching the network or the devices.

Become secure in days, not years, with significantly less resources.
