Secure industrial operations

The Xage Security Suite delivers comprehensive security for industrial operations. It protects every element, new or legacy, secures every interaction, and enables dynamic data security edge-to-edge and edge-to-cloud.

Whitepapers, Datasheets and Videos

Identity, access management and data security

Xage Broker pushes security policy from the center into the edge.

Xage Nodes, Enforcement Points and optional Clients form a blockchain-protected fabric for security and app data, operating independent of central connectivity.

Identity management and access control

Users, applications and devices authenticate and cooperate via the Xage security fabric.

"Trust and access control for devices, users, and applications at the edge are key requirements for securing industrial and commercial IoT deployments. Xage’s security platform meets all of those requirements."

Jason Shepherd

Dell IoT

Xage Node

Xage Nodes form a blockchain-protected Fabric for tamperproof on-site storage of security data, app data and identity data (with MFA as needed) plus edge-cloud dynamic data security.

  • Real-time operations without offsite dependency
  • Strength in numbers: No single point to hack
  • Credential management and proxy access
  • Device lifecycle management and provisioning

Xage Broker

Broker

Deployed centrally, the Broker connects central services such as Active Directory with the edge Fabric. It synchronizes credentials, certificates, policies and shared data between edge and center.

  • Central control, autonomous edge operation
  • Role-based remote access and single sign-on
  • Conduit for central data handling

Xage Policy Manager

The Xage Policy Manager enables security policies to be defined centrally and then replicated and enforced system-wide, automating the protection of critical infrastructure.

  • Automated cybersecurity for distributed operations
  • Controls security field-wide from a single dashboard
  • Meets evolving compliance needs e.g. NERC-CIP

Xage Enforcement Point

Xage Enforcement Point (XEP) provides protocol-agnostic access filtering plus dynamic data security with authenticity, integrity and encryption. It protects vulnerable systems and their data.

  • Protects down to specific devices & controllers
  • Blocks attempts to compromise assets or data
  • Detects new/missing devices, initiates enrollment

Traversal Tunnel and Proxy

Traversal Tunnel and Proxy

The Xage Traversal Tunnel and Proxy enables easy-to-use zero-trust remote access, proxying and data transfer across the Purdue-model layers – e.g. from OT to DMZ to IT to cloud.

  • Ipsec tunnels replace multiple open firewall ports
  • Fabric-protected tunnel-signing blocks spoofing
  • Zero-trust replaces jump boxes & segment access

On-premise or Cloud Based

Cloud

Xage’s product can be installed entirely at the customer premises, or alternatively the Xage Fabric and management components can be delivered instantly via the Microsoft Azure cloud.

  • Distributed on-prem policy enforcement
  • Central management on-prem or via Azure cloud
  • Xage Fabric for Azure instant cloud deployment

Xage Management Tools

The Xage Management Tools provide monitoring, alerting and single-pane-of-glass management of the Xage Suite.

  • Orchestration and monitoring
  • Audit and compliance
  • Attack-detection and alerting
Fabric Preview

Xage Security Suite Application Examples

Data Security Applications
  • Preventative maintenance and self-healing
    Transportation
  • Real-time authentication
    Autonomous Vehicles

  • Operational efficiency and cost reduction
    Process industry

  • Peer-to-peer devices
    Smart Meter Management

Technician Access Control
  • Remote access
    Building Management

  • Device credential rotation & user/role-based login
    Oil & Gas

  • Compliance and audit
    Fault analysis, Green energy

Cyber-hardened Business
  • Data integrity, sharing & privacy
    Supply-chain, Healthcare
  • Consensus-based attack-recovery
    Cybersecurity
  • Zero-touch device deployment
    Utilities
  • Securing unprotected controllers & devices
    Manufacturing
White Paper

Download the
Xage Whitepapers

A revolution known as the Industrial Internet of Things (IIoT) or Industry 4.0 is underway. Industrial companies are deploying intelligent systems composed of devices and software applications that cooperate with each other and with humans in real-time. These systems can contain new devices with robust security controls as well as currently installed devices, e.g., PLCs, RTUs, HMIs, meters, and sensors, that provide limited and varied security capabilities. Furthermore, as operations and enterprises are embracing data-driven automation, data and interactions need to be protected edge-to-edge, to cloud, and across the ecosystem.

Fill out this form to download the Xage whitepapers.