
Secure and protect your IT & OT assets
-
A digital lock, preventing unauthorised access
-
Only trusted users can access trusted devices
-
Secures critical devices within minutes
-
Requires no configuration of protected devices
-
Brings undeniable digital identities to legacy systems and new devices
-
Secures all traffic between devices and users
-
Multi-layered security with encryption, digital identities, authentication and traceability
Our Lock & Key approach
Client
SW

Browser
based
access





Device
behind
an XoT



ANY TYPE OF
NETWORK










Digital key(s)
Access policies
SW based digital lock(s)

-
A digital lock, preventing unauthorised access
-
Only trusted users can access trusted devices
-
Secures critical devices within minutes
-
Requires no configuration of protected devices
-
Brings undeniable digital identities to legacy systems and new devices
-
Secures all traffic between devices and users
-
Multi-layered security with encryption, digital identities, authentication and traceability
Security based on Who, What, Where & When
Secure anything, anywhere, in seconds. Without touching the underlying network or devices.



1. WHO


2. WHAT

3. WHERE

4. WHEN

"Service technicians
Germany"
"X-ray machine
CX4300"
"Hauptstraße 15
Berlin”
"Every Thursday 09:00-13:30"
USER GROUP
TYPE OF DEVICE
GEOGRAPHY
TIME
USE CASE(S)



