Xage Security
Securing the new industrial revolution.
HQ Location
United States
|
Year Founded
2017
|
Company Type
Private
|
Revenue
< $10m
|
Employees
11 - 50
|
Website
|
Xage is a startup that offers a blockchain-based security solution. Xage is building a security fabric for IoT, which takes Blockchain and synthesizes it with other capabilities to create a secure environment for devices to operate.
There are several components that play a role in providing security to the IoT network, these are the Xage Security Gateway, Xage Broker, Optional Xage Client Agent and Xage Cloud:
-The Xage Security Gateway
The Xage Security Gateway connects to diverse IIoT edge devices, providing Authentication and enforcement. Gateways form a Blockchain-secured fabric to store credentials and app data:
*Real-time operations independent of central connectivity
*Strength in numbers: Self-healing and mutually-protecting
*Industrial protocol support and device credential rotation
*Device lifecycle management, zero-touch provisioning
-Xage Broker
Deployed centrally, the Broker connects central services such as Active Directory with the edge fabric. It synchronizes credentials, certificates, policies and shared data between edge and center:
*Central control, decentralized autonomous edge operation
*Enables user & role based remote access with single sign-on
*Conduit for central data handling
-Optional Xage Client Agent
Deployed within an industrial device, the optional Client Agent allows the device to participate directly in the Xage Blockchain-secured IIOT fabric and lifecycle management system.
*Standards-based enrollment (EST, SCEP, via CoAP, HTTP)
*Low-power support
*Blockchain node: Increased security and tamper-proofing
*Xage Cloud
-The Xage Security Cloud
The Xage Security Cloud provides configuration, monitoring and single-pane-of-glass management of the Xage Suite, plus a central repository for shared app data.
*System Orchestration, monitoring, audit & data repository
*Attack detection and alerting
*Independent O.T. identity-management system if required
-
Devices Layer
-
Edge Layer
-
Cloud Layer
-
Application Layer
-
Supporting Technologies
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.
Similar Suppliers.




