top of page
Hemsidan bild.png

 Secure and protect your IT & OT assets

  • A digital lock, preventing unauthorised access

  • Only trusted users can access trusted devices

  • Secures critical devices within minutes

  • Requires no configuration of protected devices

  • Brings undeniable digital identities to legacy systems and new devices

  • Secures all traffic between devices and users

  • Multi-layered security with encryption, digital identities, authentication and traceability

Our Lock & Key approach

Client

  SW

client sw.png

Browser

based

access

dator.png
ny nyckel.png
linje 1.png
rak linje.png
linje 3.png

Device

behind

an XoT

plx.png
lås 1.png
moln ny.png

ANY TYPE OF

NETWORK

lås 2.png
maskin 1.png
lås 4.png
pil 2.png
pil rak.png
rak linje 3.png
dator jobb.png
maskin 2.png
pil böjd.png

Digital key(s)

Access policies

SW based digital lock(s)

use case bild.png
  • A digital lock, preventing unauthorised access

  • Only trusted users can access trusted devices

  • Secures critical devices within minutes

  • Requires no configuration of protected devices

  • Brings undeniable digital identities to legacy systems and new devices

  • Secures all traffic between devices and users

  • Multi-layered security with encryption, digital identities, authentication and traceability

Security based on Who, What, Where & When

Secure anything, anywhere, in seconds. Without touching the underlying network or devices.

user group.png
type of device.png
type of device.png

1. WHO

gubbar.png
gubbe 2.png

2. WHAT

type of device.png

3. WHERE

location.png

4. WHEN

tid.png

"Service technicians

Germany"

"X-ray machine

CX4300"

"Hauptstraße 15

Berlin”

"Every Thursday 09:00-13:30"

USER GROUP

TYPE OF DEVICE

GEOGRAPHY

TIME

USE CASE(S)

use case bild.png
use case bild.png

REMOTE ACCESS
FOR 3RD PARTIES

 

Enable suppliers to

connect securely from

remote locations to 

dedicated equipment

on-premise

ny pil.png
use case bild.png

SOLVING THE 

PATCHING DILEMMA

Hide critical devices and

reduce patching with

>90% (time and cost)

Extend the economic

lifespan of legacy

equipment

use case bild.png

WORK FROM HOME

Increase efficiency and

flexibility through remote

connections to IT, OT

and IoT assets for

employees and key staff

pil upp.png
pil ner.png
hus.png
use case bild.png

STOP THE INTERNAL
THREAT

Hide all relevant IT, OT

and IoT assets from

everyone, including 

employees. Only allow

trusted users access to 

trusted devices

Xertified provides security solutions for a safe society and a resilient industry. By eliminating the possibility to interfere with connected devices, we close critical security gaps in IT, OT and IoT networks. 

+46 (0)18 265 0606

559211-3251

Commercial office

Vasagatan 12

SE-111 20 Stockholm

R&D Office

Dragarbrunnsgatan 35

SE-753 20 Uppsala

bottom of page