top of page
Hemsidan bild_edited.jpg

Network security is not enough

Critical assets in IT & OT must
be secured independently

Solutions

XertifiedRemote Access

Secure outside access to individual IT & OT assets

XertifiedHide & Protect

Hide key IT & OT assets from everyone and everything

Lock & key approach

Digital key

Access policies

Digital locks

image.png
image.png
image.png
image.png
image.png
image.png

ANY TYPE OF

NETORK

on Xertified hardware

on any hardware

on cloud platforms

image.png

WireGuard encryped tunnel

PKI identity

PKI identity

  • Network independent security

  • Device independent security

  • No configuration of protected devices

  • Secure any device within minutes

  • Brings undeniable digital identities to legacy systems and new devices

  • Identities based on PKI/X.509

  • Full end-to-end encryption (using Wire Guard)

Secure anything and anywhere!

1. Use key to connect network

2. Connect exising assets

3. Install Locks on platforms

4. Secure any device

image.png
image.png
image.png
image.png
image.png
image.png
image.png
image.png
image.png

Browser Client

Desktop Client

Device behind a XoT-Lock

image.png
image.png
image.png

Server that integrates to your identity and security services

ANY TYPE OF

NETORK

image.png
image.png
image.png
image.png
image.png
image.png

Create an access policy

Without touching any underlying network or device.

1. WHO

"Service technicians in Germany"

2. WHAT

3. WHERE

"X-ray machine CX4300"

“Hauptstraße 15 Berlin”

4. WHEN

image.png

"Every Thursday 

09:00-13:30"

Use cases

Remote access for 3rd parties

Enable suppliers to connect securely from remote locations to dedicated equipment on-premise.

image.png

Work from
remote location

Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and consultants.

image.png
image.png

Stop internal and
external threats

Hide all relevant IT, OT and IoT assets from everyone, including employees.  Only allow trusted users access to trusted devices.

Reduce the urgency to patch and upgrade

Hide critical devices and reduce immediate need for patching with >90%. Extend the economic lifespan of legacy equipment.

image.png
image.png

Sharing of resources

Critical resources can be securely shared between different organisations. Different rights for different users. Even dividing on time.

image.png

Non-stationary devices

Keep IT or OT devices secure even when moving around regularly in or between networks.

​

​

Why Xertified and XoT Technology?

Designed, developed and manufactured in Sweden. Backed by the Swedish industry investors.

image.png

Works for IT, OT & IoT devices. Anywhere.

image.png

Solving a critical security gap. Without touching the network or the devices.

image.png

Become secure in days, not years, with significantly less resources.

image.png

Subscribe to newsletters

Be first to learn about product and Xertified updates!

Thanks for submitting!

Xertified

​

Xertified provides security solutions for a safe society and a resilient industry. 

By eliminating the possibility to interfere with connected devices, we close critical security gaps in IT, OT and IoT networks. 

Contact us

+46 (0)18 265 06 06

​

info@xertified.com

  • LinkedIn

Meet us

Commercial office

Vasagatan 12

SE-111 20 Stockholm

​​​​

R&D Office

Dragarbrunnsgatan 35

SE-753 20 Uppsala

bottom of page