TOSIBOX is ISO 27001 certified which shows that security is our cornerstone when developing and building OT networks. Our solution secures your sites, identifies users, and encrypts all traffic within the network. We are addressing cyber security in every step.

TOSIBOX technology adheres to the highest standards and builds on the physical security foundation. Our products identify each other by cryptographic pairing in which the user Key is matched with the Node before use, creating a trust relationship between them. When the VPN remote connection is established between the user Key and the Node, the information is encrypted and decrypted only at the connection end points (devices). You are in control, there are no backdoors. Nobody – not even Tosibox– can decrypt the data in between. Tosibox does not retain any private keys or passwords for the products. Our technical support can gain remote access only after the user has explicitly turned on the remote support feature.

The two-factor authentication is about verifying multiple properties of the client logging in claiming to be a legitimate user.
1. The physical TOSIBOX® Key or a Mobile Client device is "Something that the user has"
2. The password for the network or the device management UI is "Something that the user knows"

Our solutions are using industry standard and proven technologies such as the RSA cryptosystem, AES 256 encryption, Diffie–Hellman key exchange and TLS sessions. We are hiding all the technical complexity “behind the scenes” making our solutions easy to use with our registered trademark Plug&Go.

Plug&Go means that taking TOSIBOX "from box into use" takes only few minutes and no special IT skills are required. With fewer things for users to remember and worry about, TOSIBOX® products are practically impossible to misconfigure.


  • Highest security standards

    TOSIBOX technology adheres to the highest standards and builds on the physical security foundation. TOSIBOX products identify each other by cryptographic pairing in which the user Key is matched with the Node before use creating a trust relationship between them.

  • No hidden surprises

    With TOSIBOX technology you are in control, there are no backdoors. Tosibox does NOT retain any private keys or passwords for the products. Our technical support can gain remote access only after the user has explicitly turned on the remote support feature.

  • Two-factor authentication

    Two-factor authentication is about verifying multiple properties of the client logging in claiming to be a legitimate user.
    1. The physical TOSIBOX® Key or a Mobile Client device is "Something that the user has"
    2. The password for the network or the device management UI is "Something that the user knows"

  • End-to-end encryption

    The VPN connection is established directly between the TOSIBOX devices and the data can be decrypted only at the connection end points (devices). Nobody – not even Tosibox – can decrypt the data in between.

  • Patented connection method

    This allows establishing connection even when both parties are behind firewalls or NATs. As a result, in TOSIBOX devices there are no services that would be all the time listening or exposed to the Internet.

  • Industry standard and proven technologies

    Such as the RSA cryptosystem, AES 256 encryption, Diffie–Hellman key exchange and TLS sessions, are used in our products.

  • Simplicity     

    is good also for security. In addition to making our products secure, we have put a lot of effort on making them easy to use. With fewer things for users to remember and worry about, TOSIBOX® products are practically impossible to misconfigure.


For more security related questions or concerns, please visit our Security Center or contact our sales team for a discussion.