Xage Security Fabric

The Xage Fabric delivers comprehensive security for industrial and real-world operations. It protects every element, new or legacy, secures every interaction, local or remote, and enables dynamic data security for OT, IT and cloud.

Whitepapers, Datasheets and Videos

Identity, access and data security




Xage Broker pushes security policy from Enterprise/Cloud into OT.



Xage Nodes form a zero-trust-protected Fabric for security and app data, operating independent of central connectivity.


Users, apps & devices authenticate and cooperate via the Xage Fabric, with on-site enforcement.

"Trust and access control for devices, users, and applications at the edge are key requirements for securing industrial and commercial IoT deployments. Xage’s security platform meets all of those requirements."

Jason Shepherd

Dell IoT

Traversal Tunnel and Proxy

Traversal Tunnel and Proxy

The Xage Traversal Tunnel and Proxy enables easy-to-use zero-trust remote access, proxying and data transfer across the Purdue-model layers – e.g. from OT to DMZ to IT to cloud.

  • Ipsec tunnels replace multiple open firewall ports
  • Fabric-protected tunnel-signing blocks spoofing
  • Zero-trust replaces jump boxes & segment access

On-premise or Cloud Based


Xage’s product can be installed entirely at the customer premises, or alternatively the Xage Fabric and management components can be delivered instantly via the Microsoft Azure cloud.

  • Distributed on-prem policy enforcement
  • Central management on-prem or via Azure cloud
  • Xage Fabric for Azure instant cloud deployment

Xage Node

Xage Nodes form a zero-trust-protected Fabric for tamperproof on-site storage of security data, app data and identity data (with MFA as needed) plus OT-IT-cloud dynamic data security.

  • Real-time operations without offsite dependency
  • Strength in numbers: No single point to hack
  • Credential management and proxy access
  • Device lifecycle management and provisioning

Xage Broker


Deployed centrally, the Broker connects central services such as Active Directory with the Fabric. It synchronizes credentials, certificates, policies and shared data between OT and center.

  • Central control, autonomous OT operation
  • Role-based remote access and single sign-on
  • Conduit for central data handling

Xage Policy Manager

The Xage Policy Manager enables security policies to be defined centrally and then replicated and enforced system-wide, automating the protection of critical infrastructure.

  • Automated cybersecurity for distributed operations
  • Controls security field-wide from a single dashboard
  • Meets evolving compliance needs e.g. NERC-CIP

Xage Enforcement Point

Xage Enforcement Point (XEP) provides optional on-site access filtering plus dynamic data security with authenticity, integrity & encryption. It protects vulnerable systems and their data.

  • Protects down to specific devices & controllers
  • Blocks attempts to compromise assets or data
  • Detects new/missing devices, initiates enrollment

Xage Management Tools

The Xage Management Tools provide monitoring, alerting and single-pane-of-glass management of the Xage Suite.

  • Orchestration and monitoring
  • Audit and compliance
  • Attack-detection and alerting
Fabric Preview

Xage Security Suite Application Examples

Technician Access Control
  • Remote access
    Building Management

  • Device credential rotation & user/role-based login
    Oil & Gas

  • Compliance and audit
    Fault analysis, Green energy

Data Security Applications
  • Preventative maintenance and self-healing
  • Real-time authentication
    Autonomous Vehicles

  • Operational efficiency and cost reduction
    Process industry

  • Peer-to-peer devices
    Smart Meter Management

Cyber-hardened Business
  • Data integrity, sharing & privacy
    Supply-chain, Healthcare
  • Consensus-based attack-recovery
  • Zero-touch device deployment
  • Securing unprotected controllers & devices
White Paper

Download the
Xage Whitepapers

A revolution known as the Industrial Internet of Things (IIoT) or Industry 4.0 is underway. Industrial companies are deploying intelligent systems composed of devices and software applications that cooperate with each other and with humans in real-time. These systems can contain new devices with robust security controls as well as currently installed devices, e.g., PLCs, RTUs, HMIs, meters, and sensors, that provide limited and varied security capabilities. Furthermore, as operations and enterprises are embracing data-driven automation, data and interactions need to be protected edge-to-edge, to cloud, and across the ecosystem.

Fill out this form to download the Xage whitepapers.