What makes Tosibox so secure?
Highest security standards
TOSIBOX technology adheres to the highest standards and builds on the physical security foundation. TOSIBOX products identify each other by cryptographic pairing in which the user Key is matched with the Node before use creating a trust relationship between them.
Information confidentiality, integrity and availability
TOSIBOX protects data confidentiality by encrypting information as it is transmitted over the Internet. TOSIBOX protects data integrity by verifying information is in unaltered state when received at the end point. TOSIBOX protects data availability by providing always-on VPN tunnels for authorized users. Our products and technology are tested by experienced and independent 3rd party vendor.
Two-factor authentication is about verifying multiple properties of the client logging in claiming to be a legitimate user.
1. The physical TOSIBOX® Key or a Mobile Client device is "Something that the user has"
2. The password for the network or the device management UI is "Something that the user knows"
The VPN connection is established directly between the TOSIBOX devices and the data can be decrypted only at the connection end points (devices). Nobody – not even Tosibox – can decrypt the data in between.
Patented connection method
This allows establishing connection even when both parties are behind firewalls or NATs. As a result, in TOSIBOX devices there are no services that would be all the time listening or exposed to the Internet.
Industry standard and proven technologies
such as the RSA cryptosystem, AES 256 encryption, Diffie–Hellman key exchange and TLS sessions, are used in our products.
is good also for security. In addition to making our products secure, we have put a lot of effort on making them easy to use. With fewer things for users to remember and worry about, TOSIBOX® products are practically impossible to misconfigure.