You asked - we answered. Here are the answers to the 5 most asked questions from Tosibox Platform customers.
Tosibox enables authentic Layer 2 communication which means you do not need drivers for any ethernet protocol. Use whatever protocol, ethernet capable edge-device, data analytics software, or cloud hosting environment you choose. Leverage our automated networks to build the system you want, not the system that works with your legacy technology.
Tosibox is a cybersecurity company first. Automated networking means there is no possibility for human error in properly configuring our cybersecurity profile. Every Tosibox network includes:
Tosibox is the standard for OT cybersecurity.
Yes. Simply deploy the Tosibox Platform software in a virtual machine within your environment and use your master key to connect edge nodes to the cloud with just a couple clicks. Need Layer 2 support for BACnet or MQTT protocols? Roll your SCADA application into the Tosibox cloud for full Layer 2 access from edge-to-cloud and back.
Tosibox networks require physical first, multi-factor authentication for access. Just like an ATM requires a debit card and a PIN to get cash, a Tosibox network requires a physical, serialized device and a password for access. With access control options for laptops, tablets, and phones, all users can securely connect to their systems in the way best suited to them. And if you don’t want to manage your infrastructure, Tosibox will do it for you and distribute access to users when they need it.
None. Tosibox integrates seamlessly with existing infrastructure. IT teams need not change any settings in their firewall, open any ports, or buy and maintain any static IP addresses. Tosibox is built for the OT, and we have solved IT/OT convergence, making it easy to keep both sides of your DMZ separate but interoperable.
Have more questions? Please, do not hesitate to contact us.