Carrier-grade security for every device, on every network.

SecureAccess extends carrier-grade 5G authentication and IPsec encryption to any IP-capable device over any network transport—Wi-Fi, Ethernet, satellite, or broadband—replacing complex VPN infrastructure with a system that manages itself automatically.

Get in touch

The same security that protects every mobile phone—extended to every device you operate.

SecureAccess is a software platform that brings carrier-grade 5G authentication and IPsec encryption to any IP-capable device—from embedded microcontrollers to enterprise workstations—over any network transport, using the same SIM-based security architecture that protects every mobile phone in the world.

It consists of an embeddable SDK, a system-level Agent, and a standalone Gateway that together eliminate the need for traditional VPN infrastructure, PKI, and mobile carrier integration while providing hardware-rooted device identity, automatic tunnel management, and network-enforced per-device access control. Because authentication is based on 5G-AKA with SIM credentials, there are no pre-shared keys to distribute, no certificates to issue or renew, no PKI to operate, and no per-device configuration profiles to push. Credentials never expire, and the entire IPsec lifecycle—key exchange, tunnel establishment, rekeying—is managed automatically without administrator intervention.

Three components. One security engine.

Each component can be deployed independently or together. All three share the same proven protocol core, the same 3GPP-standard authentication, and the same IPsec encryption. The SDK and Agent connect to either a mobile operator's existing 5G infrastructure or an organization's own SecureAccess Gateway.

SecureAccess SDK

embedded

A small C library that developers embed directly into their applications or device firmware. On embedded and RTOS platforms, it provides a minimal-footprint secure tunnel with hardware-rooted SIM authentication and on-device encryption. On full operating systems, it gives a single application exclusive access to its own encrypted tunnel—no other process on the device can see or use that connection.

The SDK has no OS dependency. All platform interaction occurs through a pluggable abstraction layer. A runtime-configurable pooled memory allocator lets the same compiled binary adapt from a resource-constrained microcontroller to a full desktop application without recompilation.

No POSIX dependency—runs on bare metal, RTOS, and full operating systems
Minimal memory footprint suitable for embedded deployments
Application-level tunnel isolation on desktop and mobile platforms
Built-in userspace UDP with IP fragmentation and reassembly
Three event modes: poll, async, callback

SecureAccess Agent

system service

A system-level service installed by IT on workstations, laptops, tablets, and phones. The Agent exposes the encrypted tunnel to the operating system's network stack, allowing any application to send configured traffic through it transparently—no application modification required. Only traffic matching configured routing rules is captured and encrypted; all other traffic flows normally.

The Agent seamlessly transfers when a device moves between networks—from office Wi-Fi to home broadband to cellular—without interrupting the data stream or exposing data during the handover.

Transparent tunneling via TUN interfaces and OS routing
Up to four simultaneous tunnel connections per process
gRPC control interface for CLI, GUI, and automation
DNN-based routing—network decides what the device can access
Functional on macOS and Linux; Windows, iOS, Android in development

SecureAccess Gateway

infrastructure

A server deployed on the organization's own network that provides the same authentication and tunnel termination functions as a mobile operator's 5G core—eliminating the need for carrier integration entirely. The Gateway consolidates N3IWF, AMF, AUSF, UDM, SMF, and UPF into a single application. From a connecting device's perspective, it is indistinguishable from a production operator network.

The Gateway authenticates every device, terminates IPsec tunnels, and enforces per-device access control through named network profiles. One device class reaches one network segment, another reaches a different segment, and none can reach the others.

Single Linux binary—no external 5G core infrastructure required
Three data plane backends: 10K, 500K, and 3–6M+ concurrent devices
Compressed idle state—128 bytes per dormant device
Encrypted credential store with TPM-sealed key support
Deploys on bare metal, VM, or container

Built for the devices that matter most.

SecureAccess applies wherever devices need strong authentication and encryption but lack the cellular radios or OS capabilities to get it through traditional mobile networks or enterprise VPN infrastructure.

Enterprise Secure Access

Employees, contractors, and remote workers connect from office Wi-Fi, home broadband, hotel networks, and cellular. The Agent on each managed device provides consistent 5G-grade security regardless of location—the same credential, the same encryption, the same network-authoritative access control everywhere. IT manages one subscriber database instead of juggling VPN concentrators, certificate authorities, RADIUS servers, and per-device configuration profiles. Adding a user is one entry; revoking access is deleting it.

IoT & Industrial Sensors

Environmental monitors, building management sensors, utility meters, manufacturing floor controllers, and agricultural sensors operate on constrained processors with limited memory and no full OS. The SDK's minimal footprint and bare-metal compatibility means each sensor individually authenticates and encrypts its data stream. The Gateway's per-device network segmentation prevents a compromised sensor from being used as a pivot point to reach critical operational systems on the same network.

Medical Devices

Connected infusion pumps, patient monitors, wearable biosensors, and imaging systems transmit sensitive patient data across hospital Wi-Fi and wired networks. The SDK embedded in device firmware encrypts all data at the point of origin. The Gateway segments each device class into its own network profile—monitors reach the clinical VLAN, pumps reach pharmacy, and a compromised device on one profile has no path to another. HIPAA compliance is simplified: all PHI is encrypted in transit with 5G-grade security, and authentication events are logged at the Gateway for audit.

Remote Management

Equipment manufacturers embed the SDK into their products—HVAC systems, industrial compressors, generators, printing presses, or any fielded machinery—to establish a persistent, authenticated connection back to the manufacturer's operations center. Each deployed unit authenticates with its own SIM-based credentials and connects through the customer's existing network to the manufacturer's SecureAccess Gateway, creating a secure channel for telemetry collection, firmware updates, configuration changes, and remote diagnostics without requiring the customer to open firewall ports, configure VPN tunnels, or grant broad network access. The manufacturer sees every unit in a single management plane; the customer's network sees only an encrypted, authenticated tunnel that reaches the manufacturer's Gateway and nothing else.

Defense & Space Operations

Ground stations, C2 terminals, tactical operations centers, and deployed sensor networks connect over a mix of dedicated fiber, satellite backhaul, and tactical Wi-Fi. SecureAccess provides a uniform security layer across all transports. The Gateway deploys as a single binary on a ruggedized server with no external infrastructure dependency, creating a self-contained authenticated network in minutes. The SDK embedded in C2 software provides application-level tunnel isolation, ensuring only the command application can access the encrypted channel.

Flexible deployment models.

SecureAccess supports multiple deployment scenarios depending on whether the organization uses a mobile carrier's infrastructure, deploys its own Gateway, or both. In each case, the device-side software (Agent or SDK) is identical — only the network endpoint changes.

Scenario 1: Connect via Mobile Carrier to Enterprise Network Devices Agent or SDK Wi-Fi / Ethernet / Broadband IP Transport IPsec Mobile Carrier N3IWF / ePDG Tunnel Termination 5G Core AMF, AUSF, UPF Private DNN Enterprise Network Applications Data Center Cloud Services Carrier routes traffic to enterprise via a private DNN (Data Network Name) — a named connection profile that determines where the application data packets are delivered DNN = Data Network Name: a 3GPP identifier that maps a PDU session to a specific destination network
Scenario 2: Connect via Gateway to Enterprise Network (no carrier) Devices Agent or SDK Wi-Fi / Ethernet / Broadband IP Transport IPsec Enterprise Network SecureAccess Gateway N3IWF + AMF + UDM + SMF + UPF + AUSF Credential Store DNN Routing Applications Data Center Cloud Services Enterprise deploys the Gateway on its own network — no mobile carrier required. All authentication, encryption, and routing are self-contained within the Gateway.
Scenario 3: Connect to Gateway using mobile network as transport Devices Agent or SDK Cellular Radio Mobile Carrier (Transport Only) RAN gNB / eNB Carrier UPF IPsec tunnel passes through carrier opaquely Enterprise Network SecureAccess Gateway N3IWF + AMF + UDM + SMF + UPF + AUSF Credential Store DNN Routing Applications Data Center Cloud Services Carrier provides IP transport only — cannot see tunnel contents. The IPsec tunnel terminates at the enterprise Gateway, not at the carrier.

Built on open standards, not proprietary protocols.

Every component implements the same 3GPP and IETF standards used by mobile operators worldwide. Devices running SecureAccess interoperate with any standards-compliant 5G network infrastructure.

3GPP
5G non-3GPP access, NAS signaling, security architecture, key derivation, and authentication algorithms
IETF
IKEv2 key exchange, ESP encryption, and EAP-5G authentication transport

Let's talk about your use case.

Whether you're exploring SecureAccess for an enterprise deployment, evaluating the SDK for a connected device product, or interested in the Gateway for a defense application, we'd like to hear from you.

Veteran-OwnedSmall BusinessAlbuquerque, NM
Your information will only be used to respond to your inquiry.
Thank you for your inquiry. We'll be in touch shortly.