BlastShield™ Remote Management Console

The BlastShield™ Remote Management Console provides a single point of entry for administration of the BlastShield™ network, network nodes, and access policies. From a single secure web connection you can manage your entire BlastShield network from anywhere in the world.

Manage and control reachability and access policies

Create and manage policy groups by user, device, service, or segment

Created policies for automated quarantine of suspicious users

Real-time view of all nodes and connections

BlastShield™ Edge node

Remote users or administrators can easily authenticate and connect to the Mesh Network via BlastShield™ Edge Nodes. Edge Nodes incorporate state of the art password-less authentication. Features include:

Password-less, multi-factor network authentication

Integrates with Trusona authentication

High performance encrypted connection

High availability, automated connection redirect

True edge-to-edge encrypted connection

BlastShield™
Secure Mesh Network

BlastShield™ mesh nodes easily deploy in your existing network within minutes - creating a secure, private overlay on your network. Mesh nodes are deployed as unaddressable systems and require minimal configuration. Once deployed, mesh nodes automatically discover peers and join the mesh - creating a secure, protected barrier for critical assets, applications, and data storage systems. Features include:

Military-grade, resilient, self-healing mesh network

Zero attack surface, non-addressable

High performance - no VPN performance penalty

Easy deployment, new nodes auto-join the mesh

BlastShield™ Edge node

Remote users or administrators can easily authenticate and connect to the Mesh Network via BlastShield™ Edge Nodes. Edge Nodes incorporate state of the art password-less authentication. Features include:

Password-less, multi-factor network authentication

Integrates with Trusona authentication

High performance encrypted connection

High availability, automated connection redirect

True edge-to-edge encrypted connection

BlastShield™ Secure Mesh Network

BlastShield™ mesh nodes easily deploy in your existing network within minutes - creating a secure, private overlay on your network. Mesh nodes are deployed as unaddressable systems and require minimal configuration. Once deployed, mesh nodes automatically discover peers and join the mesh - creating a secure, protected barrier for critical assets, applications, and data storage systems. Features include:

Military-grade, resilient, self-healing mesh network

Zero attack surface, non-addressable

High performance - no VPN performance penalty

Easy deployment, new nodes auto-join the mesh

BlastShield™ Remote Management Console

The BlastShield™ Remote Management Console provides a single point of entry for administration of the BlastShield™ network, network nodes, and access policies. From a single secure web connection you can manage your entire BlastShield network from anywhere in the world.

Manage and control reachability and access policies

Create and manage policy groups by user, device, service, or segment

Created policies for automated quarantine of suspicious users

Real-time view of all nodes and connections

BlastShield™ Remote Management Console

The BlastShield™ Remote Management Console provides a single point of entry for administration of the BlastShield™ network, network nodes, and access policies. From a single secure web connection you can manage your entire BlastShield network from anywhere in the world.

Manage and control reachability and access policies

Create and manage policy groups by user, device, service, or segment

Created policies for automated quarantine of suspicious users

Real-time view of all nodes and connections

BlastShield™ Edge node

Remote users or administrators can easily authenticate and connect to the Mesh Network via BlastShield™ Edge Nodes. Edge Nodes incorporate state of the art password-less authentication. Features include:

Password-less, multi-factor network authentication

Integrates with Trusona authentication

High performance encrypted connection

High availability, automated connection redirect

True edge-to-edge encrypted connection

BlastShield™ Secure Mesh Network

BlastShield™ mesh nodes easily deploy in your existing network within minutes - creating a secure, private overlay on your network. Mesh nodes are deployed as unaddressable systems and require minimal configuration. Once deployed, mesh nodes automatically discover peers and join the mesh - creating a secure, protected barrier for critical assets, applications, and data storage systems. Features include:

Military-grade, resilient, self-healing mesh network

Zero attack surface, non-addressable

High performance - no VPN performance penalty

Easy deployment, new nodes auto-join the mesh

Advantages

Device Protection

BlastShield™ Edge Nodes contain cryptographically unique private keys that are etched in secure hardware upon first boot. This patent pending methodology eliminates the need for passwords to be stored on your computer - thereby, eliminating the risk of password theft.In addition, BlastWave’s unique password- less authentication technology eliminates the possibility of passwords being captured by key loggers.

Wide Area Network Protection

BlastShield™ Edge Nodes are directly connected to your device, eliminating the possibility of eavesdropping when connected in public locations.Additionally, the BlastShield™ network provides modern networking features, including automated connection redirect so you’ll never have to manually connect to another location.

Core Network & Application Protection

The BlastShield™ Mesh network dramatically simplifies core network segmentation management by providing a simple overlay in your existing network. Complex segmentation policies can now be performed in minutes without the need to re-configure the underlay network.In addition, BlastShield™ Mesh Nodes are built on a patent pending peer-to-peer architecture, and require no configuration changes. Simply modify the policy and changes are propagated through the network automatically!

Delivered as a Service

BlastShield™ is easy to scale and deploy, and is delivered as a service - including all hardware and software. Pricing is based on a simple annual subscription model, and customers enjoy the benefit of “zero touch” asset management. If a device fails, is lost, or is stolen it will be replaced at no cost under your subscription.

BlastShield SOFTWare-defined Private network

Maximum protection of critical infrastructure
+
One-touch access & segmentation control

Introducing BlastShield™

BlastShield™ is the most advanced private network solution available for protection of critical infrastructure and data from cyber-attack. BlastShield is a software-only solution that deploys as an overlay to existing networks. BlastShield is network agnostic, and can be deployed over any packet-based network - making it perfect for complex industrial networks. BlastShield nodes automatically discover their peers and self organize into a peer-to-peer mesh fabric - meaning you will spend no time dealing with configuration of the network. Once the network is in place you have one touch control over access control and segmentation across the entire network.

blastshield mesh instance

Your on-ramp to the invisible network

Lightweight hardened software instance*

Multiple deployment options: VM, Bare Metal, Cloud Instance

Runs on any x86 platform, or as a cloud image

Resilient peer-to-peer architecture - no server or concentrator bottlenecks

Automatic discovery of peers - no configuration required

Self-organizing - no configuration required to the network underlay

Automatically creates and manages encrypted tunnels for dynamic edge-to-edge protection

* When we say lightweight, we aren't kidding! A fully functional mesh instance can be deployed on a Raspberry Pi.
blastshield ACCESS ClIENT

True zero-trust network access

Three-surface password-less multi-factor authentication

Desktop client + External Key* + Your personal identity

Streamlined authentication experience with no password exposure

Eliminates phishing exploits as no passwords are used

User privilege and visibility into the network is controlled by policy

Migitates lateral movement and code propagation across the network

Compatible with Mac, Linux, and Windows operating systems

* Leverages Yubikey state of the art FIDO 2 technology
blastshield orchestrator

Centralized policy control with real-time enforcement

One-touch segmentation and access control

Easy asset grouping, simplifying complex segmentation management

Complete separation of control plane and data plane - not in the data path

Real-time enforcement of policy changes with no impact to network underlay

Unparalleled Protection for Critical Infrastructure

Schedule a Demo