30 Best CEOs of the Year 2020 30 Best CEOs of the Year 2020 | Page 47
devices or groups of devices that are
explicitly trusted within the Airwall
as an overlay network based on
white listing. This trust, based on
a unique cryptographic identity, or
(CID) for each device, determines
what systems or devices can initiate
and establish communication before
any data is exchanged.
Building an Airwall requires a
minimum of three components,
an Airwall Conductor, and two
or more hardware or software
appliances, which we collectively
call Airwall edge services. These can
be deployed symmetrically either in
a hub and spoke topology, mesh, or
both. Belowis a short description of
each.
Capabilities
• Cloak IIoT infrastructure:
“hackers can’t hack what they
can’t see”
• Eliminate lateral movement and
malware propagation
•
•
Unify security policy across
physical, virtual, and cloud
infrastructure
Authenticate and encrypt every
connection, based on a trusted
identity
Benefits
•
Reduce downtime of physical
infrastructure
•
•
•
Extend the useful life of IT
and Security systems, such as
firewalls, security scanners, and
proxies
Dramatically reduce the
attack surface across an entire
network
Deploy and manage less
expensively than competing
legacy solutions
Products furnished
by Tempered that are
unique
The Airwall™ Conductor
Airwall Conductor is the
orchestration engine that manages
policy for all distributed Airwall
edge services, delivering effortless
control of the network. It defines
what overlay network segments
and systems protected machines
are allowed to access, as well as
how they connect on the LAN,
WAN, and public Internet. Policy
creation and management is point-
and-click simple and requires no
advanced training. Available in both
software and hardware appliance
form factors, the Conductor
enables fast network provisioning,
micro-segmentation, and secure
connectivity based on unchanging
cryptographic machine identities,
not network addresses that change
and are spoof able.
The Airwall™ relay
The Airwall relay routes encrypted
edge service connections across
all networks and transport
options, without modifying the
underlying network. Secure end-
to-end connectivity is now simple
whether you have a Layer 2, Layer
3, or bridged L2/L3 network using
Ethernet, Wi-Fi, cellular, MPLS, or
radio. The Airwall relay allows the
WAN and Internet to behave like
one local broadcast domain, making
WAN micro-segmentation a reality.
Airwall™ server
The Airwall server is an identity-
defined perimeter for Linux and
Microsoft servers that enable simple
access and segmentation. Serving
as the network boundary and
security perimeter for its protected
workload, the Airwall server can be
deployed with little or no changes
to existing infrastructure and
eliminates the complexity associated
with a traditionally separate
network and security controls.
A workload protected by an
Airwall server can be cloaked
and made undiscoverable by
unauthorized systems. Server
access is now restricted to only
other authenticated and authorized
Airwall edge services connecting
from any network, significantly
reducing the network attack surface.
“We establish trust before connectivity with an
encrypted, orchestrated, trust overlay.”
SR