Services
XertifiedRemote Access
Problems to solve
Security principles





XoT
Technology



-
Allowing users to reach critical assets from outside the core premises
-
Reduce access times for 3rd party users from weeks to seconds
-
Ensuring the remote users only get access to what they should
-
End-to-end encryption even from outside the core network
-
Avoiding the security risks with traditional VPN services
-
NIS2 compliance even for remote users
-
One solution - multiple sites

-
Client SW with undeniable digital
identities OR -
Broswe --> jump-host --> client SW
-
Access based on WHAT, WHERE and
WHEN -
End-to-end encryption when using
client SW -
Filter on protocol / services
-
Temporary or scheduled access

XertifiedHide & Protect

Problems to solve
-
Disable the internal threat
-
Disable the external threat and
minimize attack surfaces -
Reduce patching and upgrades with >90%
-
Extend the economic lifespan for
legacy devices -
Secure machine-to-machine
communication -
Enable IT & OT to interact securely
-
Security for complex and multi-vendor networks
-
NIS2 compliance



External
adversary




Trusted user
Internal
adversary









Security principles

-
Client SW with undeniable digital
identities -
Access based on WHAT, WHERE
and WHEN -
Advanced filtering on protocols / services
-
M2M communication / security
-
End-to-end encryption
-
Only Wireguard traffic in the network
-
Possibility to duplicate the encrypted traffic to SOC platforms
-
No latteral movements
