The Chicago Athenaeum BACK TO HOMEPAGE >
Good Design
XoT S-1 | 2020
XoT S-1 | 2020


Designers: Nikolaus Frank, Martin Eriksson, Anders Ericsson, and Christer Bostróm, Frank Etc. AB., Enskede, Sweden
Manufacturer: Xertified AB., Uppsala, Sweden


This product was carefully designed to meet its specific requirements, being part of a security solution. The physical design is aimed to resist manipulation with a combination of different parts to effectively seal the unit.

It has a ruggedized form with an outer silicon shell for protection. Internal box in plastic which includes mounting bracket on the underside, allowing for secure mounting alternatives as well as accessories.

Top cover/ display window in transparent polycarbonate, screen printed from the back. Small compact design, size: 92 x 98 x 30 mm. Weight: 120g Power: USB-c Connections: RJ45, USB3 Screen: OLED 128 x 128.

Edge Security Total IoT security through dedicated access control with the concepts of edge security, undeniable identities and zero trust provide inviolable security and access control for IoT devices.

XoT technologyTM is a truly cross-platform solution that moves the security to the edge of the network and secures your connected IoT devices through dedicated access control.
It is based on Public Key Infrastructure (PKI) and utilizes the concepts of undeniable identities and zero trust. The XoT hardware installs in minutes and all your devices are easily managed and monitored with the XoT Management System (XMS) for easy life-cycle management.

Access control
The primary service that XoT delivers is total IoT security through dedicated access control. This is exactly what it sounds like, a solution based on HW and SW that enables any equipment to operate on any type of network, knowing that only the right users can access and use the protected resources XoT technologyTM is based on PKI and other security and communication standards to deliver the highest security possible without the cumbersome management of network centric systems.
XoT gives the customer full freedom to design the network based on business needs rather than an increasing amount of security threats, thereby reducing costs and unlocking the full potential in the network.

Asset management
As part of a 5-minute enrolment of each XoT HW, the customer can gather data about where the device is located, type of equipment and also get a photo of each protected device.
Based on the collected data the customer will -after a full deployment of XoT- have a complete asset register and also know exactly where each device is located.
The XoT Management System (XMS) gives the customer easy access to information regarding all protected assets, with ability to filter the data according to their needs, e.g. geography, not used since, type of equipment, manufacturer or any other collected data.

Traffic analysis
Each active XoT unit will record connection attempts, successful connections, type of data transmitted and related information. To avoid network congestion and communication flaws, this data will be sent to the XoT Management System (XMS) with a predefined and short delay.
The XMS will store all XoT logs in a structured database that will be made available to the customer for further analysis in any AI or analytics tool chosen by the customer. With this almost real-time data a number of analyses can be made, including for example:
• inappropriate use of the network and equipment
• malicious attempts to access resources
• devices not being used or being used inadequately
• understanding of bottlenecks, hurdles and other constraints
• identifying heavy users
• lost connections or instability in the network.


XoT S-1

BACK TO LIST
Good Design
The Chicago Athenaeum | 601 South Prospect Street
Galena, Illinois 61036, USA | Tel: 815/777-4444 | Fax: 815/777-2471
E-mail: curatorial@chicagoathenaeum.org