
SOLUTIONS
Secure outside access to individual IT & OT assets
Hide key IT & OT assets from everyone and everything
LOCK & KEY APPROACH
Digital key
Digital locks
Client






ANY TYPE OF
NETORK
on Xertified hardware
on any hardware
on cloud platforms

WireGuard encryped tunnel
PKI identity
PKI identity
SECURE ANYTHING & ANYWERE

Use a desktop client,
a jump-host or a secured device as key
1
Install Locks on relevant platforms
Secure any device

3

4









Browser Client
Desktop Client
Device behind a XoT-Lock



Existing identity and authorisation resources
ANY TYPE OF
NETORK

Connect to existing
resources / systems

2






AN ACCESS POLICY IN 20 SECONDS
Without touching any underlying networks or the protected devices.
WHO

1

"Service technicians in Germany"
WHAT

2

WHERE

3

"X-ray machine CX4300"
“Hauptstraße 15 Berlin”
WHEN

4

"Every Thursday
09:00-13:30"
USE CASES

REMOTE ACCESS FOR 3rd PARTIES
​
Enable suppliers to connect securely from remote locations to dedicated equipment on-premise, without increasing security risks for other devices.


WORK FROM REMOTE LOCATIONS
​
Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and key staff.


MINIMISE PATCHING AND UPGRADES
​
Hide critical devices and reduce patching with >90% (time and cost). Extend the economic lifespan of legacy equipment


STOP INTERNAL AND EXTERNAL THREATS
​
Hide all relevant IT, OT and IoT assets from everyone, including employees. Only allow trusted users access to trusted devices.

SECURE SHARING OF RESOURCES
​
Critical resources can be securely shared between different organisations. Different rights for different users. Even dividing on when (time)


MANAGE NON-STATIONARY DEVICES
​
Keep IT or OT devices secure even when moving around regularly in or between static networks

WHY XERTIFIED AND XOT TECHNOLOGY

Designed, developed and manufactured in Sweden

Closing critical security-gaps in IT & OT

Works for both legacy devices and new products

Fast implementation
& easy management