
SOLUTIONS
LOCK & KEY APPROACH
Digital key
Digital locks
Client






ANY TYPE OF
NETORK
on Xertified hardware
on any hardware
on cloud platforms

WireGuard encryped tunnel
PKI identity
PKI identity
SECURE ANYTHING & ANYWERE

Use a desktop client,
a jump-host or a secured device as key
1
Install Locks on relevant platforms
Secure any device

3

4









Browser Client
Desktop Client
Device behind a XoT-Lock



Existing identity and authorisation resources
ANY TYPE OF
NETORK

Connect to existing
resources / systems

2






AN ACCESS POLICY IN 20 SECONDS
Without touching any underlying networks or the protected devices.
WHO

1

"Service technicians in Germany"
WHAT

2

WHERE

3

"X-ray machine CX4300"
“Hauptstraße 15 Berlin”
WHEN

4

"Every Thursday
09:00-13:30"
USE CASES

REMOTE ACCESS FOR 3rd PARTIES
Enable suppliers to connect securely from remote locations to dedicated equipment on-premise, without increasing security risks for other devices.


WORK FROM REMOTE LOCATIONS
Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and key staff.


MINIMISE PATCHING AND UPGRADES
Hide critical devices and reduce patching with >90% (time and cost). Extend the economic lifespan of legacy equipment


STOP INTERNAL AND EXTERNAL THREATS
Hide all relevant IT, OT and IoT assets from everyone, including employees. Only allow trusted users access to trusted devices.

SECURE SHARING OF RESOURCES
Critical resources can be securely shared between different organisations. Different rights for different users. Even dividing on when (time)


MANAGE NON-STATIONARY DEVICES
Keep IT or OT devices secure even when moving around regularly in or between static networks

WHY XERTIFIED AND XOT TECHNOLOGY

Designed, developed and manufactured in Sweden

Closing critical security-gaps in IT & OT

Works for both legacy devices and new products

Fast implementation
& easy management