Airwall™

Purpose-built
micro-segmentation
for IIoT

Routing Icon

Securely connect, segment, and
failover any IP-enabled device,
anywhere in the world

Hardened to protect and simple to deploy

Airwalls are used to establish perimeters that only allow authenticated and authorized devices to communicate with each other, regardless of their location; LAN, WAN, or different networks across the Internet. They are deployed in-line, where protected devices behind an Airwall is invisible and inaccessible to unauthorized systems, which eliminates both north-south and east-west attack vectors.

Rapid deployment from IoT edge-to-cloud

line

Our customers deploy, connect, and protect their devices across separate networks in minutes rather than days or weeks with firewalls and VPNs. Our purpose-built platform delivers a more secure network architecture based on cryptographic identities and strong mutual authentication that is simple to orchestrate and scale.

Rapid deployment from IoT edge-to-cloud

line

Our customers deploy, connect, and protect their devices separate networks in minutes rather than days or weeks with firewalls and VPNs. Our purpose-built platform delivers a more secure network architecture based on cryptographic identities and strong mutual authentication that is simple to orchestrate and scale.

Identity defined perimeter

line

The traditional perimeter-based security model is obsolete. Airwall appliances introduce a better security model that moves the security perimeter and network boundary from the edge directly in front of individual machines. Like all Airwall edge services, the networking routes, access control, and segmentation policy for Airwall appliances are based on cryptographic machine identities and strong authentication that can’t be breached by unauthenticated systems.

Cloak your critical infrastructure

line

An Airwall authenticates and authorizes connections based on verifiable machine identities before a TCP session is established with any Airwall edge service peer. By cloaking the endpoints or networks, they have no visible TCP/IP footprint, are invisible to the underlying network, and inaccessible by any untrusted device or system.

Not only is all lateral movement stopped, but other types of network and transport layer attacks like MiTM, Command & Control, and IP spoofing can be eliminated.

Cloak your critical infrastructure

line

An Airwall authenticates and authorizes connections based on verifiable machine identities before a TCP session is established with any Airwall edge service peer. By cloaking the endpoints or networks, they have no visible TCP/IP footprint, are invisible to the underlying network, and inaccessible by any untrusted device or system.

Not only is all lateral movement stopped, but other types of network and transport layer attacks like MiTM, Command & Control, and IP spoofing can be eliminated.


Airwall Appliance Software


Airwall appliance for cloud

Workload across AWS, Azure and Google

Learn More →

Airwall appliance for Virtual

WMware and Microsoft virtualization

Learn More →


Airwall Appliances


Airwall Appliance 75

Airwall 75 series

Small IoT edge gateway

Learn More →

Airwall Appliance 150

Airwall 150 series New

Securely segment the industrial IoT edge

Learn More →

Airwall Appliance 250

Airwall 250 series

Ruggedized industrial IoT edge gateway

Learn More →

Airwall Appliance 500

Airwall 500 series

Data center, campus, or plant services gateway

Learn More →