An Intellyx Brain Candy Brief

Tosibox has leveraged its hardware engineering expertise to reinvent the virtual private network (VPN).

Its hardware-based solution consists of a simple home router-like device and USB key. Setup is as simple as inserting the key in the box, as the hardware generates a random key pair automatically. At that point, the user simply plugs the key into their laptop, enters a password, and the two pieces of hardware establish a secure network tunnel.

Mobile devices simply need an app, rather than a USB key to establish the VPN. For enterprise applications, a rackmount device at the home office or virtual device in the cloud supports multiple users, as well as Internet of Things (IoT) devices.

In fact, while simplifying the VPN without compromising security is an important benefit in itself, Tosibox’s ability to secure large numbers of IoT endpoints is the real story here. Such devices either plug into a local Tosibox device to establish secure communications, or device vendors can also incorporate Tosibox software directly into their devices.

In the latter configuration, Tosibox secures both the data feeds from the devices as well as establishing a secure control path to each device – an important capability competing IoT platforms generally do not offer.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Cortex & Brain Candy Newsletters!

Thank you for reading Intellyx thought leadership!

Please sign up for our biweekly Cortex and Brain Candy newsletters.

The Cortex features thought leadership on Agile Digital Transformation topics, and Brain Candy highlights disruptive vendors in enterprise IT.

We won't spam you and you can unsubscribe at any time.