Redwall Technologies - security for mobiles, IoT and SCADA devices
Redwall Technologies

Unparalleled security


Redwall Mobile® uses unique patented techniques to protect against threats from within and without. While other vendors work on patches for malware like KingRoot or bugs like Stagefright, Redwall devices have been safe all along. No updates required, no emergency patching.

Multi-mission, multi-persona


Dual persona simply doesn't cut it anymore. Redwall Mobile with Secure Persona® allows for any number of distinct personas, each with its own securely isolated apps, data, settings, authentication requirements, and policy that defines which processes can access which system features, drivers, files, and networks.

Quick info

Looking for quick information on Redwall Technologies product? Below are some of the brief introductory materials to get you started:



Visit the downloads page for more detailed papers and slide decks, and please contact us at sales@redwall.us if we can answer any questions or to arrange a demonstration.
Multi-mode, multi-persona

Multi-mode

Redwall Mobile is the only technology that can create multiple cryptographically and temporally isolated personas on a single device, and enforce both high-level and granular security policies outside of the operating system.
IoT, connected vehicle, wearables

IoT / Vehicles

Redwall's patented IoT security technology is embedded into devices to prevent unauthorized access, block threats both from the network or other interfaces as well from within the device, and ensure device integrity and authenticity.
Mission critical mobile

Mission-critical

Redwall's patented multi-layered approach has proven to be completely resistant to zero-day threats that have penetrated other mobile and embedded defenses with ease, making it suitable for your mission-critical devices.
Did you know...

  • Redwall Mobile does not depend on any third-party libraries nor any special features such as TrustZone.
  • Redwall is an all US company employing only US citizens, and has staff that can meet your security requirements.
  • Redwall Mobile policies control access to networks, files, peripherals, services, apps, and any resource.
  • Redwall Mobile security policies are field-updatable, but can also enforce minimal, immutable settings.
  • Redwall Mobile does not require any changes to your apps or drivers.
Redwall Logo