Airwall

Purpose built to secure critical infrastructure using an identity based, zero trust protocol.

Airwall product summary

  • A complete zero trust portfolio.
  • Securely connect anything, anywhere over any network.
  • Private overlway networks on top of existing infrastructure, no need to rip and replace.
  • Easy to manage identity-driven policies.
  • Micro-segmentation with end-to-end encryption.
  • Reduces attack surface by 95% while reducing cost and complexity by 50-80%.

How does it work?

  • Creates private overlay networks based on encrypted tunnels and trusted cryptographic identities to secure.
  • Airwall provides total control over communications.
  • Single pane of glass management console provides simple, scalable, and extensible policy management between things.
  • Based on Host Identity Protocol (HIP), an open IETF standard developed to fix the lack of mobility and security flaws of TCP/IP.

Highly available and resilient to network changes. Nothing behind an Airwall has ever been hacked.

End-to-end encryption

HIP tunnels ensure secure traffic between devices, no intercepted traffic over a global network. Set up your private overlay network independent of network perimeters.

Learn More

Identity-based policies

Easily align security policies with identity of users and devices. Authorization restricted to cryptographic ID and multi-factor authentication.

OT visiblity

Combine secure communication and policy enforcement with traffic visibility, correlation and threat detection with our ability to mirror traffic to third-party threat detection solutions.

Learn More

Software-defined orchestration

Simplify management and orchestration of security policies, protected devices, authorized users and groups and globally managed private networks through centralized software-defined controller.

Connect anything-anywhere securely

Easy to deploy over any IP network for remote access and cloud applications. Avoid fork-lift upgrades and vendor architecture lock-in.

Airwall works with any network infrastructure.

Airwall provides a completely private overlay network on top of shared, public, or even compromised infrastructure, that is both more secure and quickly and easily managed. It can deploy and operate at a fraction of the cost of other more complicated piece meal approaches, like firewalls, VPNs, VLANs and ACLs.

The network you want

The Network you want

Built on a secure foundation.

Airwall uses the more modern Host Identity Protocol (HIP) to implement a zero trust model before connections are even established. This IETF standard natively encrypts, microsegments, and securely connects, reducing your attack surface, eliminating unauthorized access, lateral movement, and malware propagation.

Learn more about HIP

Simple segmentation

Simple Segmentation

Airwall runs everywhere.

Solution components

Airwall Conductor
Airwall Conductor

Set invisibility policies

Airwall Relay
Airwall Relay

Connect unrouteable ‘critical assets’

Airwall Gateway
Airwall Gateway

Make every ‘critical asset’ invisible

Airwall Agent
Airwall Agent

Make perimeters invisible

Airwall Server
Airwall Server

Make servers invisible

Airwall gives us peace of mind. It’s a secure connectivity solution we trust. We can step away from it and be confident that our critical infrastructure is secure.

— J.M., System Protection Engineer, Major Electric Company

19410 HWY 99 STE A #119
Lynnwood, WA 98036

(206) 452-5500

© 2024 tempered.io