products

Airwall software & hardware

Airwall makes connected things invisible and protects against network-based attacks.

more about Airwall

solution components

step 1 ............................................................
Airwall Conductor

set invisibility policies

step 2 ................................................................
Airwall Relay

connect unrouteable 'things'

step 3 .....................................................................
Airwall Gateway

make every ‘thing’ invisible

.....................................................................
Airwall Agent

make perimeters invisible

.....................................................................
Airwall Server

make servers invisible

Airwall Conductor

set and manage policy

  • simple point-and-click segmentation.
  • add or revoke connectivity and access simply and easily.
  • data and control planes are decoupled (no traffic flows through Conductor).
  • eliminates need for complex management of keys/certificates, revocation lists, or shared secrets to control access.
  • much simpler audits of one system.
deployment options

cloud

  • Amazon Web Services
  • Microsoft Azure
  • Google Cloud Platform

virtual

  • VMware ESXi 6.0 & above
  • Microsoft Hyper-V Server 2012 R2 & above

physical

  • Conductor - 1U Platform

Airwall Relay

connect any ‘thing’ anywhere

  • route outbound-only connections across all networks and transport options, without modifying the underlying network.
  • connect private and previously unrouteable IP addresses.
  • eliminate the need for public IP addresses.
  • reduce inbound firewall rules.
  • network access for employees, vendors, partners from anywhere in the world.
  • preserve transport layer connections anywhere in the world regardless of devices changing IP addresses.
deployment options

cloud

  • Amazon Web Services
  • Microsoft Azure
  • Google Cloud Platform

virtual

  • VMware ESXi 6.0 & above
  • Microsoft Hyper-V Server 2012 R2 & above

physical

  • 500-1U Platform

Airwall Gateway

make every ‘thing’ invisible

  • deployed in front of devices or hosts that cannot protect themselves.
  • physical Gateways have built-in Ethernet, Wi-Fi, Cellular, as well as Serial-over IP for connectivity options.
  • virtual and cloud gateways instantly connect, protect, segment, move, failover, and disconnect any private or public cloud-based workloads anywhere in the world.
  • organizations no longer need to deploy and maintain separate networking and security policies for on-premises or cloud-based.
deployment options

cloud

  • Amazon Web Services
  • Microsoft Azure
  • Google Cloud Platform

virtual

  • VMware ESXi 6.0 & above
  • Microsoft Hyper-V Server 2012 R2 & above

physical

  • 75 series
  • 150 series
  • 250 series
  • 500 series

Airwall Agent

make devices invisible

  • give managed devices a trusted and verifiable identity with secure access, networking, mobility, and segmentation.
  • trust-based client segmentation, granular access control, encryption everywhere, and auditing is now possible in both static and dynamic IP environments.
  • enable or revoke trust in a one-click operation, ensuring network visibility and access to whitelisted devices.
  • explicitly define resources that a device or group of devices can and cannot access.
deployment options

windows

  • 7/8/10 (32/64-bit)

macOS

  • 10.14 and above

iOS/iPadOS

  • 12.0 and above

android

  • 6.0 and above

Airwall Server

make servers invisible

  • completely cloak a server itself, so only authenticated and authorized endpoints discover and communicate with it.
  • enable software-defined segmentation, and encryption at the server level, and effectively enforce a perimeter of one.
deployment options

linux

  • CentOS 6.9 and 7
  • Ubuntu 16.04
  • Fedora 25 (REHL compatible)

windows

  • 2008 R2
  • 2012 R2
  • 2016
© 2020 tempered.io