top of page

Services

XertifiedRemote Access

Problems to solve

Security principles

dator 2.png
pil neråt.png
computadora.png
gul pil.png
ring.png

 XoT

 Technology

pil upp2.0.png
grå bakgrund.png
  • Allowing users to reach critical assets from outside the core premises

  • Reduce access times for 3rd party users from weeks to seconds

  • Ensuring the remote users only get access to what they should

  • End-to-end encryption even from outside the core network

  • Avoiding the security risks with traditional VPN services

  • NIS2 compliance even for remote users

  • One solution - multiple sites

grå bakgrund.png
  • Client SW with undeniable digital
    identities OR

  • Broswe --> jump-host --> client SW

  • Access based on WHAT, WHERE and
    WHEN

  • End-to-end encryption when using
    client SW

  • Filter on protocol / services

  • Temporary or scheduled access

xertified remote access 2.0.png

XertifiedHide & Protect

grå bakgrund.png

Problems to solve

  • Disable the internal threat

  • Disable the external threat and
    minimize attack surfaces

  • Reduce patching and upgrades with >90%

  • Extend the economic lifespan for
    legacy devices

  • Secure machine-to-machine
    communication

  • Enable IT & OT to interact securely

  • Security for complex and multi-vendor networks

  • NIS2 compliance

walterW.png
kvadrat.png
gul kvadrat.png

External

adversary

walterW.png
liten röd pil.png
lång röd pil.png
computadora.png

Trusted user

  Internal

adversary

hejhej.png
pil 2.0.png
hårdvara.png
ny maskin.png
hög pil.png
kran'.png
pil 4.0.png
el.png
skopa.png

Security principles

grå bakgrund.png
  • Client SW with undeniable digital
    identities

  • Access based on WHAT, WHERE
    and WHEN

  • Advanced filtering on protocols / services

  • M2M communication / security

  • End-to-end encryption

  • Only Wireguard traffic in the network

  • Possibility to duplicate the encrypted traffic to SOC platforms

  • No latteral movements

xertified hide&protect.png

Xertified provides security solutions for a safe society and a resilient industry. By eliminating the possibility to interfere with connected devices, we close critical security gaps in IT, OT and IoT networks. 

+46 (0)18 265 0606

559211-3251

Commercial office

Vasagatan 12

SE-111 20 Stockholm

R&D Office

Dragarbrunnsgatan 35

SE-753 20 Uppsala

bottom of page