+27 (0)11 568 0236 sking@acontrols.co.za

Tosibox Network is an innovative solution designed to simplify secure remote access to networks and devices. It addresses the growing need for secure connections in the era of IoT, Industry 4.0, and remote management. Unlike traditional VPNs or remote desktop solutions, Tosibox offers a user-friendly, hardware-based approach thereby ensuring a high level of security.

How Tosibox Network Works

The Tosibox approach revolves around creating a secure, encrypted connection between a central unit (the Tosibox Lock) and remote units (the Tosibox Keys). The core idea is to establish a direct VPN tunnel without the complexities typically associated with setting up such connections. Here is a step-by-step explanation of how it works:

  1. Tosibox Lock: The Tosibox Lock is the central device in the network, typically installed at the location where the devices you want to access remotely are situated. It manages and secures the network, thereby creating a secure VPN connection to authorised users.
  2. Tosibox Key: The Tosibox Key is a physical USB device that users plug into their computer to gain secure access to the network managed by the Tosibox Lock. Each Key is paired with a specific Lock, ensuring that only authorised devices can connect.
  3. Tosibox Node: A Tosibox Node is a network device (like a router or another Lock) that can extend the Tosibox network to other locations. This allows for a scalable network that can include multiple sites and devices.
  4. Tosibox Virtual Central Lock (VCL): The VCL is a software-based counterpart to the hardware Locks, designed for virtualised environments or large-scale deployments. It offers centralised management of multiple Locks and Keys.
  5. Connection: When a user connects their Tosibox Key to a computer and launches the Tosibox Client software, the Key establishes an encrypted VPN tunnel to the Lock or Virtual Central Lock. The user is then granted secure access to the devices and networks connected to the Lock.

Security Benefits of Tosibox Network

Security is one of the strongest points of Tosibox. The system is designed with several layers of protection, making it a reliable choice for industries where data integrity and privacy are critical.

  1. End-to-End Encryption: Tosibox uses strong encryption algorithms (AES-256) to ensure that data transmitted between the Lock and Key is secure. The encryption is applied to the entire communication tunnel, ensuring that any data intercepted would be unreadable.
  2. Hardware-Based Security: Unlike software-only solutions, Tosibox relies on physical devices for authentication. A hardware-based approach reduces the risk of unauthorised access since physical possession of a Key is required for connection.
  3. Two-Factor Authentication (2FA): The use of a physical Key combined with a password provides two-factor authentication, adding an extra layer of security.
  4. No Backdoors: Tosibox emphasises that their system has no backdoors. All communication is peer-to-peer, meaning no third-party servers or intermediaries can access the data further enhancing privacy.
  5. Scalability and Segmentation: Tosibox allows for network segmentation, meaning different users can be given access to specific parts of the network. This feature is essential for larger organisations where multiple users with different access levels are common.

Components of a Tosibox Network

You will need to understand the primary components involved to set up a Tosibox network,

  1. Tosibox Lock: The Lock is the heart of the Tosibox network. It connects to the internet and acts as the central hub that manages connections to all the devices on your network. The Lock comes in several models, such as the Lock 150, Lock 210, and Lock 500, each designed for different network sizes and requirements. For instance, the Lock 500 is suited for larger networks with higher bandwidth needs, while the Lock 200 is more suitable for smaller setups.
  2. Tosibox Key: The Key is a USB device that contains the security credentials needed to connect to the Tosibox Lock. Each Key is uniquely paired with a Lock. This ensures that only authorised users can access the network. There are also software-based Keys for mobile devices, making it convenient for users to connect from smartphones and tablets.
  3. Tosibox Node: Nodes are used to extend the Tosibox network. If you have devices in different physical locations or want to connect multiple sub-networks, Tosibox Nodes can be deployed to create a seamless network that spans multiple sites.
  4. Tosibox Virtual Central Lock (VCL): For larger organisations with multiple Locks and Keys, the VCL provides a centralised management interface. It allows for the management of hundreds of Locks and Keys from a single point, streamlining operations and simplifying network administration.
  5. Tosibox Mobile Client: The Mobile Client is a software-based Key that allows users to connect to the Tosibox network from their mobile devices. This client is particularly useful for field engineers, salespeople, and others who need secure access on the go.

Setting Up a Tosibox Network

Setting up a Tosibox network is straightforward, thanks to its plug-and-play design. Here is a step-by-step guide:

Install the Tosibox Lock:

Start by connecting the Tosibox Lock to your network. This can be done via Ethernet, and in some models, cellular connectivity is also available for remote locations. Connect the Lock to a power source and wait for it to initialise.

 

Pair the Tosibox Key:

Plug the Tosibox Key into a computer connected to the same network as the Lock. Use the Tosibox Client software to pair the Key with the Lock. This process involves the Key generating a unique cryptographic pairing that ensures it can only connect to this specific Lock.

Configure the Lock:

Access the Lock’s web interface using a browser. The interface allows you to configure various network settings, including IP addressing, firewall rules, and device access permissions. Set up the devices that you want to be accessible via the Tosibox network. This could include PLCs, cameras, sensors, or any other networked device.

Deploy Tosibox Nodes (if necessary):

If your network spans multiple locations, install Tosibox Nodes at each site. Pair these Nodes with the central Lock, extending the secure network to all locations.

Distribute Tosibox Keys:

Hand out the Tosibox Keys to authorised users. Each user will plug the Key into their computer to gain secure access to the Tosibox network. For mobile users, set up the Tosibox Mobile Client and pair it with the Lock.

Test the Connection:

Have users connect to the Tosibox network using their Keys. Ensure that they can access the necessary devices and that the connection is stable and secure.

Monitor and Maintain:

Regularly check the Tosibox Lock’s interface for any firmware updates, which may include security patches and new features.

Monitor access logs to ensure there are no unauthorised attempts to access the network.

Tosibox is a powerful and secure solution for establishing remote access to networks and devices. The hardware-based approach, combined with robust encryption and easy scalability, makes it an ideal choice for industries requiring reliable and secure connectivity. Subsequently, by understanding the components and following the setup guide, organisations can deploy a Tosibox network quickly and confidently. Tosibox ensures secure remote access in a world where connectivity is more critical than ever.

 

At ACS, we understand that customers want the latest technologies. Therefore we have partnered with innovative, dynamic companies like Tosibox to enable our clients to take their businesses to the next level. The Tosibox Platform is a secure network infrastructure that enables the communication between OT automation, applications, and the people that run them. Consequently, with all available data in one place, decisions are made to optimize operations and business outcomes. The automation provided by Tosibox allows our customers to recognize value improvements through scale and security thus minimizing the time required for implementation.

Contact us to discuss your network infrastructure requirements.