AegisWire™ · Deployment

Deploy on Your Terms

Every Model. Same Trust Architecture.

Managed SaaS, dedicated single-tenant, self-hosted sovereign, or hardware appliance — same trust and policy architecture with different control boundaries.

Managed SaaS
Dedicated hosted
Self-hosted sovereign
Hardware appliance

Deployment Models

Choose the deployment model that matches your control, compliance, and operational requirements. Every model runs the same trust and policy architecture.

Managed SaaS

Fastest to Deploy

Hosted and operated by AegisWire. Get started fast with enterprise-grade isolation and uptime guarantees out of the box.

  • Dedicated per-customer control plane containers
  • Isolated data plane per tenant
  • Standard and dedicated regions available
  • SLA: 99.9% control plane, 99.95% gateway per region
  • Fastest time to deployment

Best for

SMEs, regulated SMB, mid-market

Dedicated Hosted

Enterprise

Your cloud account, managed by AegisWire. Full single-tenant isolation with the operational simplicity of a managed service.

  • Customer's cloud, AegisWire-managed
  • Single-tenant isolation
  • Custom gateway regions
  • Full operational visibility
  • HA/DR included

Best for

Large enterprises needing control with managed operations

Self-Hosted

Sovereign

Customer-operated under licence. Complete infrastructure control with sovereign data residency and air-gap support.

  • Customer-operated, licensed
  • Full infrastructure control
  • Sovereign data residency
  • Air-gap compatible
  • No external dependencies

Best for

Government, defence, sovereign workloads

Hardware Appliance

Available Now

Pre-loaded gateway and control plane on a physical device. Hardware-rooted trust for classified and air-gapped environments.

  • Pre-loaded gateway + control plane on physical device
  • Customer-controlled edge enforcement
  • Hardware-rooted trust
  • Classified environment support

Best for

Critical infrastructure, air-gapped environments

Gateway Architecture

Traffic is cryptographically isolated across all deployment models. Each customer has unique SPC, credentials, and encryption keys — regardless of shared or dedicated infrastructure.

Managed SaaS

Shared regional gateway fleet, cryptographically isolated per customer. Each customer has unique SPC, credentials, and encryption keys.

Dedicated Hosted

Dedicated gateway containers running in the customer's cloud account. Full tenant-level isolation with AegisWire-managed operations.

Self-Hosted / Hardware

Dedicated gateways on customer-owned infrastructure. No shared components. Full sovereign control over all traffic paths.

Cryptographic Isolation

Every customer receives unique Security Policy Certificates (SPC), credentials, and encryption keys. Traffic isolation is enforced cryptographically — not through network segmentation alone. This holds true across all deployment models, from shared regional gateways to dedicated hardware appliances.

Multi-Cloud Support

AegisWire deploys across major cloud providers and on customer infrastructure. Same trust architecture everywhere.

AWS

Primary

Microsoft Azure

Supported

Google Cloud Platform

Supported

Customer Infrastructure

Self-hosted

Compliance & Sovereignty

Built for organisations with strict regulatory, data sovereignty, and audit requirements. Every deployment model supports compliance by design.

Data Residency Controls

Enforce data residency at the gateway level. Choose where traffic is processed and where policy decisions are made.

Regional Gateway Fabric

Deploy gateways in specific regions to meet jurisdictional requirements. Traffic stays within defined geographic boundaries.

Air-Gap Compatible

Self-hosted and hardware appliance models support fully air-gapped deployments with no external dependencies.

Sovereign Cloud Options

Deploy on sovereign cloud infrastructure to meet national security and data sovereignty requirements.

Signed Releases & SBOM

Every release is signed with verifiable provenance. SBOM generation for full supply chain transparency.

Audit-Ready Evidence

Automated evidence packaging for compliance audits. Structured logs, policy snapshots, and enforcement records.

Ready to Deploy?

Whether you need managed simplicity, dedicated control, or sovereign isolation — our team will help you choose the right deployment model.