Universal industrial cyber solutions

Secure local and remote access. Zero-touch device enrollment, tracking and revocation. Fingerprinting, authentication and identity for apps, machines and people. Data security for edge and edge-thru-cloud.

Whitepapers, Datasheets and Videos
Identity and Access Management

Identity and Access Management

Today, industrial operators are experiencing transformational change focused on autonomous data-driven, machine-to-machine IoT cooperation. The network-layer isolation security methods of the past are insufficient, exposing vulnerable systems to the risk of cyber-attack.

Xage’s Identity and Access Management services are delivered on-site, remain robust even if the network is breached, and cover a comprehensive array of IoT, SCADA, PLC, RTU and HMI systems together with the latest control and monitoring applications. Xage’s solution synchronizes with corporate systems such as Active Directory, enabling IT-OT consistency with role-based access control (RBAC) and single-sign-on across the operation.

Xage’s solutions deliver granular application-level security and control. Operators are able to instantly create or revoke groups and policies for devices, applications, and people, enabling secure access and secure cooperation. All access attempts are tracked with a tamperproof audit-log. Policies (e.g. for access control, device password rotation or multi-factor authentication) are set centrally but delivered and enforced autonomously in the field using the Fabric. This maximizes uptime and avoids inline dependencies on remote assets. Plus Xage’s XEP protects legacy systems, detecting any unauthorized changes, and blocking attempts at compromise.

Xage is deployed non-intrusively, without any changes to the protected devices and industrial controllers. The Xage Policy Manager manages all devices, apps, users and data-streams field-wide from a single dashboard. Policy Manager also automates operational security, ensuring compliance with evolving regulations such as NERC-CIP.

dynamic data sharing

Dynamic Data Security

Data, data sharing, and data-driven automation lie at the heart of the digital transformation of industry. By enabling and controlling data sharing across multiple processes, locations and ecosystem participants, from the edge to the cloud, industrial companies can transform how they use their data with opportunities for new optimization, revenue and customer value creation.

Xage’s Dynamic Data Security enables end-to-end security across the entire data platform, from physical machines through edge analytics to shared cloud-based data lakes. Multiple participants and their applications can both access and publish data securely, enabling them to work together without losing control or exposing themselves to cyber risk.

The Dynamic Data Security system digitally hashes, signs and encrypts operational data at source, committing the resulting security information to the Xage Fabric. The Fabric protects and replicates the security information to ensure that the underlying operational data can be published or consumed anywhere as needed, with its authenticity, integrity and confidentiality protected by the Fabric. Additionally, Xage’s XEP protects data as it travels from system to system, automatically and dynamically establishing a XEP-to-XEP encryption tunnel or relay when data, such as Modbus information from a PLC, is being transmitted.

Xage’s Dynamic Data Security empowers businesses to transform the ways they operate internally, work with partners and suppliers, and serve their customers. It supports applications from transactive energy (TE/DER) through custody transfer tracking to advanced supply chain cooperation.

Download the Solution Brief

Device Lifecycle Management

Device Lifecycle Management

Enterprises are deploying more and more connected devices as the Industrial Internet of Things (IIoT) becomes a reality. Operators require a flexible enrollment solution to authenticate and enroll devices at scale.

Xage Device Lifecycle Management verifies device authenticity in the field, based on owner, manufacturer, location, and device fingerprints. It tracks assets and enrolls legitimate devices in the multi-vendor trust system, which enables users, applications, and devices to work together–all without the need for pre-staged app and device enrollment or configuration.

White Paper

Download the
Xage Whitepapers

A revolution known as the Industrial Internet of Things (IIoT) or Industry 4.0 is underway. Industrial companies are deploying intelligent systems composed of devices and software applications that cooperate with each other and with humans in real-time. These systems can contain new devices with robust security controls as well as currently installed devices, e.g., PLCs, RTUs, HMIs, meters, and sensors, that provide limited and varied security capabilities. Furthermore, as operations and enterprises are embracing data-driven automation, data and interactions need to be protected edge-to-edge, to cloud, and across the ecosystem.

Fill out this form to download the Xage whitepapers.