Unmatched device-level protection for IoT
Redwall's patented security core runs as part of a device's firmware to verify the integrity, adjust settings based on the security posture, block privilege escalation, and thwart rogue processes from accessing resources like memory and device drivers. Unlike competitors, Redwall is designed for SWAP-constrained devices, and requires no connectivity or specialized hardware.
Patented and patent-pending technology protects even unpatched devices from zero-day threats and known malware.
Flexible security policies allow for any number of different personas to have different capabilities or limitations.
Redwall does not rely on any device or chip manufacturer's technology, and is portable to a variety of devices.
Redwall's team has deep roots innovating in the medical device space, and we carry that legacy forward by applying the same skill and precision to the development of Redwall products. Redwall's protection core prevents unauthorized access to or modification of devices from the OR to the recovery room.
Wearable devices do much more than count our steps these days. Some make critical body measurements, control doses of medication, collect evidence for law enforcement, or help the warfighter coordinate. Redwall can protect these devices from attack, and also assure their data has not been tampered with.
Redwall's patented SCADA security monitor redefines the state of the art in device security. SCADA devices (or industrial IoT devices) can set different policies for device control, limits, and access based on security alarms and current measurements of device security posture.
Redwall's minimal device requirements and ability to measure the integrity of a system makes it perfect for sensors and controls, including alarms, sensors, controls, and home automation devices. Adding assurance to these devices protects them and their data, as well as the networks they connect to.
Further reading, papers, and presentations
Did you know...
- Redwall Mobile security policies are field-updatable, but can also enforce minimal, immutable settings.
- Redwall Mobile policies control access to networks, files, peripherals, services, apps, and any resource.
- Redwall works with industry partners to offer a variety of 8(a) contract vehicles.
- Redwall Mobile can operate with or without a server (MDM) component, and is suitable for tactical, non-connected (disconnected) deployments.
- Redwall can help you with your small business set-asides.