Zero Trust Data Mesh
for
Critical Infrastructure

Connect, protect, direct mission-critical data

Hero image

Our vision

is to be the secure digital backbone of the world’s critical infrastructure.

Energy & Utilities illustration
Energy & Utilities
Cities illustration
Cities
Transportation illustration
Transportation
Mining illustration
Mining
Industry 4.0 illustration
Industry 4.0
Defence & Security illustration
Defence & Security

We can help you

Remotely control and monitor your assets

Secure by design

Zero trust architecture

Data-centric security

Granular access controls

Operate in challenging environments

Fixed or mobile assets

Underground

In the arctic

On the battlefield

Meet regulatory compliance

Quantum-safe

Data sovereignty

Microsegmentation

Asset inventory

We build a decentralized connectivity, IoT/OT cybersecurity, and data mesh solution to help organizations connect and secure their operational technology networks and assets and increase the resilience of their critical infrastructure.

We fuse key connectivity, security, cross-domain, and reliability features into a single solution to provide end-to-end security from the tactical edge across clouds and domains, enabling a distributed OT environment in the most challenging conditions.

MetroEdge™ Logo

Connect

sensors and other assets at the edge to ingest data in real-time using formally verified data ingestion software, with provable reliability and security guarantees.

MetroProtect™ Logo

Protect

data using two layers of quantum-safe encryption, ensuring confidentiality, integrity, and availability of operational data.

MetroGrid™ Logo

Direct

mission-critical data to the users and applications that need it in a secure, zero trust, peer-to-peer network.

Our software platform, rugged gateway, and cross-domain solutions enable quantum-safe, zero trust, data-centric security, and ubiquitous connectivity to assets in OT networks; managed using an app that can configure and visualize the network, devices, data, and security state.

Our solution is a secure foundation for the digital transformation of critical infrastructure.

 illustration

Secure by design and default

Zero trust network and data access, built with memory safe programming languages and core components proven using formal methods to have no runtime errors.

 illustration

Protects data and sovereignty

Data-centric security ensures all data is accessed on a need to know basis, including by system administrators.

 illustration

Removes data silos

Incrementally replace patchwork of connectivity and security systems and expand options for data sharing by securely connecting disparate and isolated systems.

 illustration

Distributed and decentralized

Data is streamed peer-to-peer and securely relayed through neighbouring peers when needed to adjust to network partitions for a more resilient network.

 illustration

Democratized data

Leverage all the data available in the network, with fine-grained access controls and without compromising security.

We value

Privacy illustration
Privacy
Our technology is privacy preserving.
Security illustration
Security
Our technology features military-grade cybersecurity.
Safety illustration
Safety
Our technology is certifiable.
Equity illustration
Equity
Our technology works for everybody.
Reliability illustration
Reliability
Our technology is built to last.

Get in touch to learn more about our secure technologies.