USE CASES
Remote access for 3rd parties
Enable suppliers to connect remotely to dedicated equipment on-premise.

What
Allowing 3rd party temporary access to IT, OT or IoT resources at the company premises.
-
Support technician.
-
Consultants.
-
Supply chain.
-
Shared R&D teams.
Why XoT
Simplify the access grant process from weeks to seconds.
Ensure that 3rd party users cannot reach anything else than appointed devices, even if they try.
Enable anyone to reach anything from anywhere.
Unique Selling Points
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device agnostic.
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains.
Work from remote location
Increase efficiency and flexibility for employees and key staff.
Why XoT
Easy way to add remote access capabilities regardless of current network architecture and security framework.
Same way to access all types of devices in all types of locations.
What
Both employees and the organisation can benefit in various ways through remote access capabilities. So far this has been extremely difficult, especially into sensitive networks.
Being able to reach critical equipment remotely can in many cases save time and money.

Uniqueness
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device agnostic.
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains.
Minimise patching and upgrades
Hide critical devices and reduce patching with >90% (time and cost).

What
Constant patching in IT, OT and IoT to address new vulnerabilities is resource exhausting and may disturb operations through forced downtime.
Besides the Zero-Day issue, some legacy devices don’t even have any patches available.
Why XoT
Hide all assets so that no new CVE:s can reach or affect these devices.
Secure all assets in the same way, do not touch the underlying network or security architecture.
Average time to exploitation of new vulnerabilities is 5 days.
Unique Selling Points
Simplicity
Easy way to remove future CVE threats by hiding all devices behind digital locks.
Agnostic
Network independent and device agnostic. Anything. Anywhere.
Stop internal and external threats
Hide all relevant IT, OT and IoT assets from everyone. Only allow trusted users access to trusted devices.

What
Hide and secure all assets from everyone, always.
>50% of all cyber incidents are initiated from within the own network. Partly due to inefficient security solutions, partly due to inappropriate access rights and inflexible processes.
Why XoT
Using undeniable digital identities for both man & machine and encrypting all traffic end-to-end.
Easy to implement even in complex multi-vendor networks.
Unique Selling Points
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device agnostic.
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains.
Secure sharing of resources
Share resources between organisations or teams with different rights. Allocate time slots if needed.

What
Enable secure use of connected devices for users from different organisations, without compromising the security.
Allow access based on time or other relevant rules.
Why XoT
Using undeniable digital identities for both man & machine and encrypting all traffic end-to-end.
Simple implementation and administration of access policies allows for a very flexible usage of assets.
Unique Selling Points
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device agnostic.
Traceability
Logging who, what and where for analysis in 3rd party tools.
Manage non-static devices
IT and OT devices can be used anywhere at any time,
the security remains extremely high.

What
Devices within health-care and certain OT networks needs to move around regularly and this is extremely complex and risky in static networks.
Besides security issues, there is also a challenge with IP addresses and structures.
Why XoT
Security based on type of device and geographical location, totally unrelated to underlying network.
Easy to implement even in complex multi-vendor networks.
Unique Selling Points
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device agnostic.