30 Best CEOs of the Year 2020 30 Best CEOs of the Year 2020 | Page 47

devices or groups of devices that are explicitly trusted within the Airwall as an overlay network based on white listing. This trust, based on a unique cryptographic identity, or (CID) for each device, determines what systems or devices can initiate and establish communication before any data is exchanged. Building an Airwall requires a minimum of three components, an Airwall Conductor, and two or more hardware or software appliances, which we collectively call Airwall edge services. These can be deployed symmetrically either in a hub and spoke topology, mesh, or both. Belowis a short description of each. Capabilities • Cloak IIoT infrastructure: “hackers can’t hack what they can’t see” • Eliminate lateral movement and malware propagation • • Unify security policy across physical, virtual, and cloud infrastructure Authenticate and encrypt every connection, based on a trusted identity Benefits • Reduce downtime of physical infrastructure • • • Extend the useful life of IT and Security systems, such as firewalls, security scanners, and proxies Dramatically reduce the attack surface across an entire network Deploy and manage less expensively than competing legacy solutions Products furnished by Tempered that are unique The Airwall™ Conductor Airwall Conductor is the orchestration engine that manages policy for all distributed Airwall edge services, delivering effortless control of the network. It defines what overlay network segments and systems protected machines are allowed to access, as well as how they connect on the LAN, WAN, and public Internet. Policy creation and management is point- and-click simple and requires no advanced training. Available in both software and hardware appliance form factors, the Conductor enables fast network provisioning, micro-segmentation, and secure connectivity based on unchanging cryptographic machine identities, not network addresses that change and are spoof able. The Airwall™ relay The Airwall relay routes encrypted edge service connections across all networks and transport options, without modifying the underlying network. Secure end- to-end connectivity is now simple whether you have a Layer 2, Layer 3, or bridged L2/L3 network using Ethernet, Wi-Fi, cellular, MPLS, or radio. The Airwall relay allows the WAN and Internet to behave like one local broadcast domain, making WAN micro-segmentation a reality. Airwall™ server The Airwall server is an identity- defined perimeter for Linux and Microsoft servers that enable simple access and segmentation. Serving as the network boundary and security perimeter for its protected workload, the Airwall server can be deployed with little or no changes to existing infrastructure and eliminates the complexity associated with a traditionally separate network and security controls. A workload protected by an Airwall server can be cloaked and made undiscoverable by unauthorized systems. Server access is now restricted to only other authenticated and authorized Airwall edge services connecting from any network, significantly reducing the network attack surface. “We establish trust before connectivity with an encrypted, orchestrated, trust overlay.” SR