30 Fastest Growing Private Companies to Watch 2023
Xage Security – Accelerating and simplifying the way enterprises secure, manage and transform digital operations
The Silicon Review
Xage is the first and only zero trust real-world security company. The Xage Fabric accelerates and simplifies the way enterprises and governments secure, manage and transform digital operations across OT, IT, and cloud. Xage solutions include Identity & Access Management for on-site security, zero trust remote access, and data protection, all powered by the Xage Fabric. Its security and IoT experts have created security products and industrial automation solutions used by global 1,000 companies. Using its experience enabling high growth markets, the company delivers the only truly decentralized platform for protecting the Industrial Internet of Things.
Identity-Based Access Management
Too often, access control in operational technology systems is an all-or-nothing proposition. Once a user, or an attacker, is inside the network, they can access any device without further authentication. Furthermore, access from device to device is not controlled, making lateral movement easy for an attacker who compromises a single device. A new approach to access control is required to minimize the attack surface and secure today’s interconnected OT, IT, and Cloud environments. Identity-based access management protects your assets against some of the most common and effective methods of attack, including stolen credentials and the use of exploits against vulnerable systems. Don’t just detect attacks in progress, stop them in their tracks. Overprivileged accounts and permissive cyber architectures give cyberattackers access to your critical assets. Manage access to protect your environment. Manage identities and privilege levels across multiple identity providers and across multiple zones, from OT to IT to DMZ to Cloud. Unlike other access management solutions, Xage identity-based access management assures that you control every interaction across OT, IT, and Cloud. You no longer have to tolerate risky implicit trust zones, shared accounts, and separate, costly credential and privilege access management tools. Now you can defend modern and legacy assets with or without their own credentials or built in security, all using a single, browser-based console.
Zero Trust Remote Access
Preventing costly disruptions and defending against escalating cyber threats dramatically elevates the need to modernize your industrial cybersecurity. Against this backdrop, industrial organizations increasingly require secure remote access to once-isolated operational assets. While the benefits of remote connectivity are significant, widening internet exposure leaves Industrial Control Systems (ICS) and Operational Technology (OT) assets vulnerable to cyberattacks. Successfully meeting demands for secure remote access starts with adopting a unified approach. A modern solution based on zero trust principles makes it easy to deliver granular, just-in-time access down to individual assets. Shift from a network-centric to an identity-centric remote access policy model, with each identity forming its own perimeter. Strengthen your cybersecurity posture by eliminating all-or-nothing access regardless of the maturity – or lack thereof – of native device controls. Reduce vulnerable attack surface area – providing just enough access for just enough time – to accelerate cyber-hardening without disruption. You can no longer afford to depend on a mix of disjointed remote access methods, from traditional VPNs to an overreliance on IT-centric solutions. A fragmented approach not only jeopardizes productivity gains but also creates the ideal conditions for cyberattackers and failed regulatory compliance. Xage Zero Trust Remote Access makes it easy to create and enforce granular, identity-driven access policies between operational assets and remote users and applications.
With Xage there’s no need to rip and replace existing infrastructure or suffer disruptive changes to protect all digital interactions between users and assets. Powered by the highly available Xage Fabric, Xage Zero Trust Remote Access simplifies and secures connectivity to and through your OT-IT DMZ. You no longer need to open multiple firewall ports for access via common protocols – such as SSH, VNC, RDP, HTTPS, PROFINET, Modbus, or others – safeguarding your at-risk assets without impacting productivity. Xage Zero Trust Remote Access solution cyber-hardens virtually any cyber-physical system. Regardless of the maturity of native device capabilities, you can add advanced security controls, like Multi-Factor Authentication, point-in-time access approval workflows, and role-based access controls. You’ll also gain a single pane of glass for managing and monitoring all remote activity giving you unmatched visibility for incident response and demonstrating regulatory compliance.
Dynamic Data Security
Data, data sharing, and data-driven automation lie at the heart of the digital transformation of industry. By enabling and controlling data sharing across multiple processes, locations and ecosystem participants, from the edge to the cloud, industrial companies can transform how they use their data with opportunities for new optimization, revenue and customer value creation. Xage’s Dynamic Data Security enables end-to-end security across the entire data platform, from physical machines through edge analytics to shared cloud-based data lakes. Multiple participants and their applications can both access and publish data securely, enabling them to work together without losing control or exposing themselves to cyber risk. Xage’s Dynamic Data Security empowers businesses to transform the ways they operate internally, work with partners and suppliers, and serve their customers. It supports applications from transactive energy (TE/DER) through custody transfer tracking to advanced supply chain cooperation.
Duncan Greatwood | Chief Executive Officer
Most recently, Duncan was an executive at Apple, leading search-technology projects and products. Prior to Apple, Duncan was C.E.O. of Topsy, the pioneer in social media search and analytics acquired by Apple in 2013. Prior to Topsy, he was founder and C.E.O. of PostPath, the email and security company acquired by Cisco in 2008. Previously, Duncan held sales and marketing Vice President roles at Virata/Globespan/Conexant, as well as earlier engineering and marketing positions at Madge Networks.
Duncan holds a B.A. (Mathematics) and M.Sc. (Computer Science) from Oxford University and an M.B.A. from London Business School.