The HIPswitch Series

Purpose-Built
Micro-Segmentation
For IIoT

Routing Icon

Securely connect, segment, and
failover any IP-enabled device,
anywhere in the world

Hardened to Protect and Simple to Deploy

HIPswitches are used to establish perimeters that only allow authenticated and authorized devices to communicate with each other, no matter if they are on the LAN, the WAN, or different networks across the Internet. They are deployed in-line, where protected devices behind a HIPswitch are invisible and inaccessible to unauthorized systems which eliminates both north-south and east-west attack vectors.

Rapid Deployment from IoT Edge-to-Cloud

line

Our customers deploy, connect, and protect their machines across separate networks in minutes, rather than days or weeks with firewalls and VPNs. The purpose-built platform delivers a more secure network architecture based on cryptographic machine identities and strong mutual authentication that is simple to orchestrate and scale.

Rapid Deployment from IoT Edge-to-Cloud

line

Our customers deploy, connect, and protect their machines across separate networks in minutes, rather than days or weeks with firewalls and VPNs. The purpose-built platform delivers a more secure network architecture based on cryptographic machine identities and strong mutual authentication that is simple to orchestrate and scale.

Identity Defined Perimeter

line

The traditional perimeter-based security model is obsolete. HIPswitches introduce a better security model that moves the security perimeter and network boundary from the edge directly in front of individual machines. Like all HIP Services, the networking routes, access control, and segmentation policy for HIPswitches are based on cryptographic machine identities and strong authentication that can’t be breached by unauthenticated systems.

Cloak Your Critical Infrastructure

line

A HIPswitch authenticates and authorizes connections based on verifiable machine identities before a TCP session is established with any HIP Service peer. By cloaking the endpoints or networks, they have no visible TCP/IP footprint, are invisible to the underlying network, and inaccessible by any untrusted device or system.

Not only is all lateral movement stopped, but other types of network and transport layer attacks like MiTM, Command & Control, and IP spoofing can be eliminated.

Cloak Your Critical Infrastructure

line

A HIPswitch authenticates and authorizes connections based on verifiable machine identities before a TCP session is established with any HIP Service peer. By cloaking the endpoints or networks, they have no visible TCP/IP footprint, are invisible to the underlying network, and inaccessible by any untrusted device or system.

Not only is all lateral movement stopped, but other types of network and transport layer attacks like MiTM, Command & Control, and IP spoofing can be eliminated.


HIPswitch Software


HIPswitch for Cloud

Workload across AWS, Azure and Google

Learn More →

HIPswitch for Virtual

WMware and Microsoft virtualization

Learn More →


HIPswitch Hardware


HIPswitch 75 series

Small IoT edge gateway

Learn More →

HIPswitch 150 series New

Securely segment the industrial IoT edge

Learn More →

HIPswitch 250 series

Ruggedized industrial IoT edge gateway

Learn More →

HIPswitch 500 series

Data center, campus, or plant services gateway