Automated Policy Enforcement

To improve efficiency, companies in sectors like energy, manufacturing, transportation, and utilities are digitizing their operations. They’re networking devices from voltage controllers in the electrical grid to transient devices such as the laptops and USB drives used by field technicians. These numerous distributed devices now represent the vast majority of the industrial assets vulnerable to cyberattack.

With Xage Policy Manager, the first automated and decentralized cybersecurity solution for distributed assets, industry can protect critical infrastructure while ensuring compliance with evolving regulations and standards such as NERC-CIP. The Policy Manager enables customers to define and enforce security requirements for all devices, apps and users field-wide from a single dashboard.

Role-Based Access Control

Industrial control systems (ICS) and industrial IoT devices require role-based access control (RBAC) for effective operation. RBAC enables remote system access, saving time and money, and dramatically improves and simplifies access security, whether remote or on-site.

Xage RBAC sets secure device passwords and holds the passwords on-site in the tamperproof Fabric, making default, lost, shared or stolen passwords a thing of the past. The Fabric also holds credentials and access policies, requiring personnel and applications to login to the Fabric using their corporate credentials and granting only the access and capabilities policy allows.

With Xage RBAC, setting device passwords is automated, and passwords are complex, hidden and regularly rotated. Local and remote login for users is made as simple as connecting to a corporate system, and all changes are tracked with a tamperproof audit-log, protecting against financial and reputational loss.

Xage Systemic Tamperproofing

Industrial devices and SCADA, PLC, RTU and HMI systems are increasingly linked together, and the network-layer-blocking or air-gapping methods of the past are becoming less effective, exposing many vulnerable systems to heightened risks of cyber-attack.

Xage’s blockchain-protected Fabric already provides tamperproofing for the passwords, enrollment and policies required to run continuous edge operations. Now, Xage Systemic Tamperproofing uses device and industrial control system (ICS) fingerprints stored in the Fabric to protect edge processes end-to-end and prevent device and ICS compromise. Xage detects any unauthorized fingerprint change, and if a device or controller is compromised, it will be isolated to prevent the contagion from spreading.

Edge Authentication & Identity

Today’s industrial operators are experiencing transformational changes focused on autonomous data-driven machine-to-machine IoT cooperation at the edge. Now, machines, people and applications are working together to exchange data, make decisions and take action.

Xage Authentication and Identity Management enables secure any-to-any application-level security and access control. Operators are able to instantly create security groups and policies for devices, applications and people to enable secure cooperation and data exchange. Policies can be set centrally but are enforced autonomously in the field using the Xage Fabric, maximizing industrial uptime by avoiding dependencies on remote cloud assets.

Device Lifecycle Management

Enterprises are deploying more and more connected devices as the Industrial Internet of Things (IIoT) becomes a reality. Operators need a flexible enrollment solution to authenticate and enroll devices at scale.

Xage Device Lifecycle Management verifies device authenticity in the field based on owner, manufacturer, location and fingerprint using a simple device birth certificate. It tracks assets and enrolls legitimate devices in the multi-vendor trust system that enables users, applications and devices to work together. All without the need for pre-baked device and app security configuration.

White Paper

Download
the whitepaper

The current model of enterprise security is incapable of protecting Industry 4.0 with its intermittently connected, heterogeneous devices and applications, distributed across organizations and geographies. Today’s centralized IT security paradigm needs to be replaced by cybersecurity that is distributed, flexible and adaptive.