X I E L D
R E – T H I N K I N G I T – S E C U R I T Y
How It Works
XIELD Client
XIELD Management Server
on in-house network
or as managed service
XIELD Security Service
Communication
- All communication is encrypted (AES)
- As it’s only a hash-value which is communicated there is close to 0% load on a system
- Hashing is done by SHA-256, SHA-1 and MD6
- All processes are stored at XIELD Cloud Service
Programming
What does the customers want from security?
Simplicity
Certainty
Cheaper solutions
Availability
No loss
No burden
Re-thinking is badly needed to satisfy these demands
For Privates, SMB and Large Organizations
Simplicity
- Installation and configuration in seconds
- Can run invisible to network users
Security
- Encryption
- Very few things on the client/endpoint – most security elements on server
- Military level defense for everybody, private and business
Administration
- Extremely simple administration
- Full overview of everything running on the network
- Goodbye to old versions, illegal versions, bloatware etc.
- Lesser burden on helpdesk
XIELD adds a new dimension to security and network control, releases resources and opens the door to a more safe private and business world
The Benefits From XIELD
Simplicity
Certainty
Cheaper solutions
Availability
No loss
No burden
Re-thinking is badly needed to satisfy these demands
Overview
Further steps:
- Xield for Smartphones, tablets, Linux
- Xield with integrated necessary basic anti-virus elements
About Us
Xield Security A/S, a Danish shareholding company was formed in 2018 by well-known security researchers and developers.
Prior to starting Xield the co-founders Martin Lemvig Lorentzen and Villy Rasmussen worked together for the past >20 years developing the World’s first personal firewall and other groundbreaking security technologies.
Realizing that today’s security technologies could not cope any longer with the increasing amount of threats coming every day they decided to realize an old dream about a technology which not only closes one of the main reason why a computer can be hacked but also puts an end to another troubled area in IT Security and network administration: Complications.
Helped by a team of international experts and investors and with several years of research and re-thinking it took less than one year to complete what others have tried to solve over more than a decade