Use-cases
Remote access for 3rd parties
Enable suppliers to connect securely from remote to equipment on-premise.

What
​
Allowing 3rd party temporary access to IT, OT or IoT resources at the company premises.
-
Support technician.
-
Consultants.
-
Supply chain.
-
Shared R&D teams.
Why XoT
​
Simplify the access grant process from weeks to seconds.
Ensure that 3rd party users cannot reach anything else than appointed devices, even if they try.
Enable anyone to reach anything from anywhere.
Unique Selling Points
​
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device-agnostic.
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains.
Solving the patching dilemma
Hide critical devices and reduce patching with >90% (time and cost).
Extend the economic lifespan of legacy equipment.

What
​
Constant patching in IT, OT and IoT to address new vulnerabilities is resource exhausting and may disturb operations through forced downtime.
Besides the Zero-Day issue, some legacy devices don’t even have any patches available.
Why XoT
​
Hide all assets so that no new CVE:s can reach or affect these devices.
Secure all assets in the same way, do not touch the underlying network or security architecture.
Average time to exploitation of new vulnerabilities is 5 days.
Unique Selling Points
​
Simplicity
Easy way to remove future CVE threats by hiding all devices behind digital locks.
Agnostic
Network independent and device-agnostic. Anything. Anywhere.
Work from home
Increase efficiency and flexibility through remote connections to IT, OT and IoT assets for employees and key staff.
What
​
Both employees and the organisation can benefit in various ways through remote access capabilities. So far this has been extremely difficult, especially into sensitive networks.
Being able to reach critical equipment remotely can in many cases save time and money.
Why XoT
​
Easy way to add remote access capabilities regardless of current network architecture and security framework.
Same way to access all types of devices in all types of locations.

Unique Selling Points
​
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device-agnostic.
​
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains
Stop the internal threat
Hide all relevant IT, OT and IoT assets from everyone, including employees. Only allow trusted users access to trusted devices.

What
​
Hide and secure all assets from everyone, always.
>50% of all cyber incidents are initiated from within the own network. Partly due to inefficient security solutions, partly due to inappropriate access rights and inflexible processes.
Why XoT
​
Using undeniable digital identities for both man & machine and encrypting all traffic end-to-end.
Easy to implement even in complex multi-vendor networks.
Unique Selling Points
​
Time to secure
Apply or approve an access policy in 20 seconds.
Ease of use
Requires no knowledge of underlying network. Fully device-agnostic.
Regulatory compliance
NIS 2 compliance, e.g. secure supply chains.