Redwall Technologies - security for mobiles, IoT and SCADA devices
Redwall Technologies

Unparalleled security

Redwall Mobile® uses unique patent-pending techniques to protect against threats from within and without. While other vendors work on patches for malware like KingRoot or bugs like Stagefright, Redwall devices have been safe all along. No updates required, no emergency patching.

Multi-mission, multi-persona

Dual persona simply doesn't cut it anymore. Redwall Mobile allows for any number of distinct personas, each with its own securely isolated apps, data, settings, authentication requirements, and policy that defines which processes can access which system features, drivers, files, and networks.

Quick info

Looking for quick information on Redwall Technologies product? Below are some of the brief introductory materials to get you started:

Visit the downloads page for more detailed papers and slide decks, and please contact us at if we can answer any questions or to arrange a demonstration.
Multi-mode, multi-persona


Redwall Mobile is the only technology that can create multiple cryptographically and temporally isolated personas on a single device, and enforce both high-level and granular security policies outside of the operating system.
IoT, connected vehicle, wearables

IoT / Vehicles

Redwall's patented IoT security technology is embedded into devices to prevent unauthorized access, block threats both from the network or other interfaces as well from within the device, and ensure device integrity and authenticity.
Mission critical mobile


Redwall's patented multi-layered approach has proven to be completely resistant to zero-day threats that have penetrated other mobile and embedded defenses with ease, making it suitable for your mission-critical devices.
Did you know...

  • Redwall Mobile offers performance benefits over virtualization, and faster deployment over hypervisors.
  • Redwall Mobile can operate with or without a server (MDM) component, and is suitable for tactical, non-connected deployments.
  • Redwall's technology is not ITAR or CCI restricted, and we welcome inquiries from all US allies.
  • Redwall Mobile security policies are field-updatable, but can also enforce minimal, immutable settings.
  • Redwall Mobile does not depend on any third-party libraries nor any special features such as TrustZone.
Redwall Logo