Unboxed for You

Tosibox Platform is an automated, open cybersecurity platform for your operational technology networks and infrastructure. It scales from one user and one device to an enterprise-level OT network solution with hundreds or even thousands of users, devices, and sites connected. Tosibox Platform fits all industries and organizations, regardless of the size or vertical, and is designed to meet your needs today and well into the future.

Certified Cyber Security

Tosibox is ISO27001 certified, underlining the importance we place on protecting customers´ data. Their platform security is based on automated firewall settings and point-to-point VPN technology with 256 Bit AES data encryption. Tosibox Platform supports Layer 2 and layer 3 routing functions and protocols.

100% Fully Automated

Our patented automation helps eliminate human error saving time and money while building, maintaining, and expanding your OT network environment. Our patented technology ensures the highest security and instant connectivity with no 3rd party cloud routing or static IP addresses needed.

You Own the Data

A healthy building network can lower operational costs and conserve energy; all while self-managing to minimize maintenance time as the network grows.


How it Works

With TOSIBOX® you can create a fully secure remote connection within minutes, and without special IT skills. You can build and manage networks and IoT infrastructures with the easily expandable and timeless solution.

We offer centralized real-time management of your devices and access control that help you generate cost savings. With TOSIBOX® adding new devices or users into the network is simply drag and drop, whereas with old-fashioned IT networks completing the same task takes days or weeks.



Build your IoT Ecosystem with Tosibox®


Modular TOSIBOX® Technology

With modular TOSIBOX® technology, you can build and manage a secure IoT infrastructure in minutes. The TOSIBOX® IoT ecosystem can be tailored according to your needs.

TOSIBOX® solution creates a direct VPN tunnel between TOSIBOX® Lock and Key. The solution consists of modular components that offer unlimited expandability and flexibility. All products are compatible with each other as well as internet connection, operator, and device agnostic. The system works both in internal and external networks.

Let us help you get secure remote access today!

TOSIBOX® was designed and built for your IOT infrastructure and remote access. Whether it's remote maintenance, access control, simplified networking, or always-on data analytics and data collection, TOSIBOX represents the innovation the market is looking for!

Let Stromquist Assist you in getting started today!



The Technology 

TOSIBOX® Key

Is a client used to access the network. In addition to a Master Key, the ecosystem can have several users with more physical keys, mobile app or software licenses.

TOSIBOX® Lock

Is a router with firewall sharing access to devices. One TOSIBOX® Lock protects all devices behind it. As the company grows, more Locks can be added to various locations.

TOSIBOX® Virtual Central Lock

Is the platform for easy network and access rights management. You can limit access, add new users and objects simply by drag and drop.


TOSIBOX® Locks

TOSIBOX® Locks 200/500 are an intelligent remote access and networking device that serves as an endpoint for secure remote connections. Devices connected to the Lock are securely accessed over the Internet and most LAN and WAN networks through an encrypted VPN connection. 

NAT and firewall friendly, the Lock's patented Plug & GO connection method takes you out of the box and into use in less than 5 minutes, without the need for software installations, network configurations or special skills. 



TOSIBOX® Keys

TOSIBOX® Keys are an intelligent cryptoprocessing device that enables a secure connection between your computer and one or more TOSIBOX® Locks, giving you full visibility and control over the network devices connected to the Lock.

Connections are established through a secure, encrypted VPN tunnel over the Internet or other common WANs and LANs, and permissions can be easily granted, revoked, and configured in an unlimited number of ways.