Cyber Security at the Edge

Protected Remote Management Solutions

for NVIDIA® Jetson™

Edge AI Devices

Securely manage NVIDIA® JetPack 4.6 onward versions with Cyber Security at the Edge protecting all networks and hardware. Allxon integrates exclusive threat intelligence by Trend Micro IoT Security™ (TMIS) to ensure you receive multi-layered protection.

Protect Now
800-x-600---Main-Page-3

Allxon x TMIS

Protected Remote Management Solutions

for NVIDIA® Jetson ™

Edge Devices

Securely manage edge devices with added threat intelligence protecting all networks and hardware. Allxon enforces Trend Micro IoT Security™, supporting NVIDIA Jetson 4.6 onward versions. Join our early access program to experience next level RMM.

Join Us Now
20210807_插畫需求_tina_isometric-1_2

Say No to AI/IoT Threats with Multi-Layered Protection

Allxon merges their remote device management services with industry-leading cyber security solutions, powered by Trend Micro IoT Security™ (TMIS). With fully secure end-to-end encryption on all Allxon cloud architectures and network communication from the cloud to the edge, Allxon adds another protective layer of TMIS system hardening on edge devices to combat and protect their users against the rapid emergence of dangerous AI/IoT threats.

500-550-left-1
500-550-left-1

Allxon x Trend Micro

500-550-right-1
500-x-550-1

Cyber Attack

中 5

All-Round Support and Protection for Edge AI Devices

Allxon supports edge AI devices throughout their entire lifecycle with Cyber Security at the Edge doubling up on cyber security to significantly reduce attack surfaces. Allxon offers the security, flexibility, scalability, and manageability that is key for successful AI/IoT operations.

Trend Micro x Allxon IoT Device Life Cycle - 20211202-4
TrendMicroIoT_test_logo
messageImage_1629119722619

An Advancement in Edge AI Device Security

300-44-Go2

Cyber Security at the Edge features Allxon’s remote device management services to bring Trend Micro’s threat detection technology to the cloud for users to better understand how and when their devices are being protected.

20210807_插畫需求_tina_cs6_icon_1

Block Attacks

Cyber Security at the Edge analyzes and blocks suspicious activities using TMIS Hosted Intrusion Prevention System (HIPS), matching traffic and content to their world-class network packets.

20210807_插畫需求_tina_cs6_icon_4

Vulnerability Checks

High-level tests are run to detect and classify weaknesses in networks and systems. Upon detection, Cyber Security at the Edge shields systems with TMIS virtual patches until new updates are available.

20210807_插畫需求_tina_cs6_icon_2

Threat Prevention

Cyber Security at the Edge uses Trend Micro Web Reputation Services™ (WRS) to perform reputation checks by matching open source libraries with known vulnerabilities for vigilant web threat detection and prevention.

20210807_插畫需求_tina_cs6_icon_3

Access Restriction*

Cyber Security at the Edge uses TMIS Approved Application Listing (AAL) to only allow authorized script files and applications to process and perform within devices. *Customization required, contact Allxon for more details.

                                                     *Selected systems only. Contact Allxon for more details.

Lorem ipsum dolor sit amet, consectetur adipiscing elit Learn More

05210527_isometric01-02-1

An Advancement in AI/IoT Security

Cyber Security at the Edge instantly adds exclusive Trend Micro IoT Security (TMIS) protection to networks and devices upon installation to ensure users benefit from Allxon's remote device management services in the simplest and safest way possible.

over the air update

Uninterrupted Over-The-Air (OTA) Operations

Safely update or deploy software updates remotely with Cyber Security at the Edge blocking suspicious activities and potential attacks around the clock.

single unified portal

Monitor AI/IoT and Security

Actively engage in monitoring the safety of your devices and ensure all networks are operating under protection.

alert

Security Alerts

Receive instant alerts about security events and protection statuses. Use Allxon’s remote device services to immediately recover systems and resolve issues.

disaster recovery-1

Recover Systems and Security

Perform disaster recovery services with Allxon swiftDR Series knowing Cyber Security at the Edge is protecting all networks and devices for complete system restoration.

Head over to:

Enable
Navigate
FAQ

Enable: Cyber Security at the Edge

Installing Cyber Security at the Edge is so easy! Check it Out!

Command Prompt

Have a new device? Simply install using a command line.

Allxon Portal

Already have connected devices? Simply install Cyber Security at the Edge on Allxon Portal.

Navigate: Cyber Security at the Edge

Cyber Security at the Edge is simple to use and easy to understand
Check it Out!

Security Events

Two types of cyber threat activities will show under security events: Malicious Network Attack and Web Threat Detection.

Alert Settings

Users can set up the alert channels and alert types they would like to receive via email, LINE, or Webhook.

Things You Should Know

Take a look at our FAQ section to learn more about Cyber Security at the Edge. Learn More

How long does installation take?

Depending on network speed, installation should take 3-4 mins, not exceeding 10 mins long.

How much storage will I need?

You will need 102.3 Mb to install Cyber Security at the Edge.

20210807_插畫需求_tina_cs6---Wanda-(white-logo-2-中-全白)-2
2-1
3-2

Putting your safety first

Allxon is committed to the highest level of confidentiality and security to bring you the safest option there is for remote AI/IoT operations on the market.

Contact Us

Lorem ipsum dolor sit amet, consectetur adipiscing elit Learn More