- Johnson Controls
- OpenBlue
- OpenBlue Airwall
- OpenBlue Secure Remote Access
OpenBlue Secure Remote Access
Zero-trust remote access for any network, anywhere
What is OpenBlue Secure Remote Access?
OpenBlue Secure Remote Access is the ability to connect users, devices, and workloads to critical resources without exposing your network to unnecessary risk. Unlike traditional VPNs that extend broad network access, secure remote access uses identity-based policies and encrypted tunnels to ensure only authorized endpoints can communicate. Airwall delivers this through a Zero Trust Software-Defined Perimeter (SDP), creating a private, cloaked overlay network across IT, OT/ICS, IoT, cloud, and remote sites. This approach reduces attack surfaces, prevents lateral movement, and simplifies centralized policy orchestration—making remote access secure, scalable, and easy to manage.
Why organizations need a modern Secure Remote Access model?
- Network boundaries are disappearing; users, devices, and workloads span on premises and cloud.
- IoT/OT systems must be protected, isolated, and remotely managed—without broad network exposure.
- Traditional firewalls, VLANs, and VPNs struggle to provide granular, identity based access at the device level.
Airwall applies a Zero Trust SDP to create a private, encrypted overlay network where policies align to user/device identity. It eliminates man in the middle risks found in legacy VPNs and centrally orchestrates tunnels and access via the Conductor—making remote access secure, scalable, and simple.
Benefits
Restore a virtual air gap for critical assets.
End-to-end encryption for all remote connections.
Harden and cloak devices and prevent unauthorized discovery.
Contain malware/ransomware and stop insider overreach.
Simple enforcement with no forklift upgrades or vendor lock-in.
How it works?
- Deploy Airwall Edge Services/Agents to protected assets and endpoints.
- Define allow list policies in the Conductor based on identity and explicit permissions.
- Airwall establishes peer to peer encrypted tunnels (overlay) across any IP infrastructure.
- Unauthorized users cannot see or reach protected devices (cloaking), stopping discovery and lateral movement.
Start building a secure, identity-based remote access solution today.
Key features
Zero trust SDP with identity-based policies at the user and device level.
Conductor orchestration for centralized setup of tunnels and policies.
HIP based foundation (Host Identity Protocol) enabling cryptographic identities and micro-segmentation across environments.
Encrypted overlay tunnels between any systems over any network.
OpenBlue Secure Remote Access FAQs
-
How is secure remote access different from a traditional VPN?
Airwall enforces a Zero Trust SDP: access is identity based and scoped per device/workload. It sets up encrypted overlays and prevents lateral movement, rather than extending broad network reach as many VPNs do.
-
Does Airwall work across any IP infrastructure?
Yes. Airwall creates encrypted tunnels over any network (WAN, internet, cloud, remote sites) and orchestrates them centrally via the Conductor.
-
Can Airwall protect legacy OT/ICS and IoT devices?
Yes. Airwall cloaks devices, segments communications, and enforces identity based policies keeping legacy systems reachable only by authorized endpoints.
-
What security standard underpins Airwall identities?
Airwall is built on HIP (Host Identity Protocol), an identity based networking approach that enables secure overlays and micro segmentation.
OpenBlue insights
More insights

















.jpg?la=en&h=320&w=720&hash=244C75B74F0F77521D56164450973BCD)














.jpg?la=en&h=310&w=720&hash=8D9823F26AA80B2B75C3E4B2E61770DC)


.jpg?la=en&h=320&w=719&hash=13CA7E4AA3E453809B6726B561F2F4DD)
.jpg?la=en&h=306&w=720&hash=F21A7CD3C49EFBF4D41F00691D09AEAC)

.png?la=en&h=320&w=720&hash=18CFCCD916C92D922F600511FABD775D)


