Meet us at RSAC 2026 to explore runtime security for agentic workloads.
Solutions

Connection Security

Every connection authenticated by SPIFFE identity. Automatic mutual TLS at the kernel level — no code changes, no sidecars, no proxies.

Your Last Pen Test Already Showed This

The pen tester got a foothold on one workload and reached the database in three hops. The finding: "Lateral movement unrestricted within network segment. No mutual authentication between services." IP-based security gives you the illusion of segmentation without actual identity.

Network segmentation is not identity

Two workloads on the same subnet look identical to a firewall. An attacker who compromises one inherits all of its network-level access.

NetworkPolicies don't survive rescheduling

Pod selectors and CIDR blocks don't prove who is connecting — they prove where traffic originates. When a pod moves, the policy may not follow.

Service mesh mTLS fails open

Sidecar proxies provide mTLS, but they run in user space. Misconfigured iptables rules let traffic bypass the sidecar. When the sidecar crashes, the workload falls back to plaintext — silently.

No mutual authentication

Most service-to-service communication uses one-way TLS at best. The server proves its identity; the client does not. Any process that can reach the endpoint is implicitly trusted.

How It Works

Deploy the Riptides agent. Your workloads get identity automatically — no code changes, no config. Every connection is encrypted and mutually authenticated. Applications send plaintext; the network carries encrypted, authenticated traffic.

2

Every connection gets mTLS automatically

When both sides have Riptides, connections are automatically encrypted and mutually authenticated. Applications send plaintext; the kernel handles the rest. No code changes, no certificate management.

3

Define access policies by identity

Control which workloads can talk to each other using identity-based policies — not IP addresses. Only explicitly allowed identities can connect. Switch to enforce when ready.

What Makes This Different

Close the zero trust audit finding

Move from "network segmentation" to "SPIFFE identity on every connection." The pen tester's lateral movement path no longer exists.

Private keys never leave kernel memory

Keys are generated and stored exclusively in kernel space. No process, memory dump, or debug tool can extract them.

Default deny at the kernel

Connections without a matching policy are blocked before the application sees them. No implicit trust, no fallback to plaintext, no way to bypass from user space.

Gradual migration, not a big bang

Start with PERMISSIVE mode — accepts both plaintext and mTLS. Monitor connection telemetry. Switch to MUTUAL to enforce. No cutover weekend.

Use Cases

Zero Trust Microsegmentation

Lateral movement stops at the identity boundary

Two workloads on the same subnet cannot communicate unless explicitly allowed by identity. Lateral movement after breach is contained to the compromised identity — not the network segment.

Database Authentication

Database and message broker connections via mTLS

Database connections and Kafka/RabbitMQ traffic authenticated with mTLS. The database sees a verified identity on every connection — no passwords, no shared certificates.

Cross-Cloud

Cross-cluster and cross-cloud connections

When combined with identity federation, the same mTLS model extends across clusters, clouds, and organizational boundaries.

Network Security vs. Riptides

Network-Based Security Riptides
Identity model IP addresses, CIDR blocks Cryptographic workload identity
Authentication None (trust the network) Mutual TLS on every connection
Lateral movement Unrestricted within zone Blocked unless explicitly allowed
Private key protection Application manages keys Keys in kernel memory only
Enforcement Sidecar proxy (user-space, bypassable) Kernel module (cannot bypass)
Code changes Proxy config, iptables rules None
Identity portability Tied to IP / pod selector Follows workload across infra
Audit posture "We have network segmentation" "Every connection is cryptographically authenticated"

Ready to secure your
workloads?

Kernel-level identity and enforcement. No code changes. Deploy in minutes.