Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security...

10

Transcript of Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security...

Page 1: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.
Page 2: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Welcome!

Page 3: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Agenda

1. Introduction

2. Key and Lock basics

3. Managing Keys

4. Technology and security overview(lunch break)

5. Advanced features

6. Scaling with the Central Lock

7. Mobile Client

Page 4: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Tosibox Company Highlights

• Established in 2011

• Patented solution

• ~15 people + subcontractors

• Based in Oulu, Finland

Page 5: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

PATENTED SOLUTION•Patents covering the Connection method and device arrangement

World’s First Plug-And-Go Remote Access Device

Page 6: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Problem

?

• Customers don’t have an easy solution to access and control remote devices and it is difficult to scale up the system when needed

• The network devices may be connected to the Internet, but they cannot reach each other automatically

• Connecting and controlling those devices remotely, an expert on DYN DNS, static IP addresses, firewalls and involvement of network operators are required

Page 7: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

TOSIBOX SOLUTION• TOSIBOX automatically connects the network devices over

the Internet in minutes, with a flexible and scalable system• Lower IT costs, lower capital cost, lower maintenance cost,

faster connectivity to end-users

Mobile Client

Page 8: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Multiple

Connection

s to Lock

Access to many Locks

with a single key

If necessary, keys will get limited user rights

* x pcs

* x pcs

Continuous communication (M2M) and remote access key

TOSIBOX example use cases

Page 9: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

TOSIBOX BENEFITS

TAKE INTO USE ONLY IN 5 MINUTES

HIGH LEVEL DATA SECURITY

FLEXIBLE AND EXPANDABLE SOLUTION

WORKS RELIABLY IN ALL KINDS OF INTERNET CONNECTIONS

Page 10: Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.

Compared to competitors

• TOSIBOX provides a physical solution – more secure than software-only products

• End-to-end encryption - no intermediaries in the cloud

• Easiest and fastest way to get M2M connectivity

Plug and Go!