Launching XertifiedRemote Access
- xertifiedab
- Jan 15
- 1 min read
We are proudly launching our dedicated solution where we enable outside users to access critical devices inside a network, subsequently called XertifiedRemote Access. It combines undeniable digital identities and full end-to-end encryption with a unique ease of use as you can create, change or apply an access policy in less than 20 seconds.
XertifiedRemote Access comes in two flavours, either with the use of our client-software that runs on Microsoft, MacOs and Linux for any type of end-user equipment, or by using a browser to connect to our web-access platform that allows anyone that the customer invites to join the security solution through a jump-host placed on Internet or a DMZ.
Remote access remains one of the key challenges for both IT and OT networks and by simplifying the efforts, increasing the security significantly and keeping track of who is doing what, Xertified contributes to unlock the potential that digitisation enables. XertifiedRemote Access delivers a trusted user all the way to a trusted device, without touching anything else in any network on the way, making sure that the customer can operate critical devices and assets even in remote locations or by using resources that are not on-site.
To know more about the technology and how it works, go to www.xertified.com or contact our Technical Product Manager, Rikard Hjelm rikard.hjelm@xertified.com
To talk about how this could benefit your organisation, your business or your opreations, contact our Commercial Director, Anders Juhlin anders.juhlin@xertified.com