Move from Detection and Response to Protection and Prevention
Seamless to integrate.
Simple to manage.
Gradient Security Mesh layers easily on top of existing infrastructure to provide Beyond Zero Trust guarantees with bolt-on simplicity.
Security Mesh is offered...
- Securely cloud hosted (as a service),
- On premises via rack-mountable appliance,
- Or federated across both.
Fully standards compliant digital credentials (x.509 certificates, SSH keys, tokens) are used to communicate ephemeral, unforgeable identity and integrity for users, devices and data. Security Mesh is plug and play compatible with modern IAM, IdP (Microsoft Active Directory, Kerberos), and SIEM/SOAR/XDR tools.
This simplicity belies the hardened, auto scaling and self-healing network that runs the Gradient Policy Engine, the intelligence behind Security Mesh. The brains that power this network are Gradient’s own secure enclave processors, the only chips robust to all known sidechannel attacks including Foreshadow, Rowhammer, Spectre, Meltdown and others. And, they’re only available inside Gradient Security Mesh.
Whether your environment runs air gapped, operates remotely with intermittent connectivity, or is plugged in to highly available data center infrastructure, we have you covered.
Deployable to Everything, Everywhere
Gradient Security Mesh is software deployable to any endpoint - truly edge to cloud - from the lowest power embedded / IoT devices to on-premises servers, BYOD laptops, and cloud native containerized infrastructure. Security Mesh can secure legacy hardware via a compact plug-and-play secure adapter.
Gradient’s Security Mesh is deployable to anything that runs code.
Security Mesh has been designed from the ground up to leverage a gradient of hardware and software roots of trust, including Trusted Platform Modules (TPMs) and vTPMs, Apple’s T2 security co-processor, Arm TrustZone, RISC-V based secure enclaves, physically unclonable function (PUF) based key systems, and is extensible to commercially available Trusted Execution Environment (“enclaves”).
In cloud environments, Gradient can leverage AWS Nitro and other hardware roots of trust. At the low power extreme, Security Mesh may be deployed as a bootloader upgrade for embedded microcontrollers.
Even in cases where no hardware root of trust is available, Security Mesh is able to mitigate risk of credential compromise through use of ephemeral credentials. Security policies are configurable to rotate credentials at any frequency desired, down to one time use credentials. In this manner, credential exfiltration risk is mitigated by the fact that credentials are effectively rendered obsolete before a hacker is able to make use of them.
If you missed this year’s IoT Solutions World Congress (IOTSWC) in Barcelona, there’s one...... read more
A continent apart, this year’s RSAC & Gartner® Security and Risk Management Summit echoed a common...... read more
Cybersecurity Mesh Innovator Gradient Technologies Receives Coveted 2022 MassVentures START Award ...... read more
Eliminate Breaches with Gradient Security Mesh
Secure your credentials and firmware vulnerabilities from compromises. Get continual verification that your devices and users are explicitly authenticated and proactively protected against today’s increasingly sophisticated malware and ransomware attacks.