Air-gapped deployment
no internet, no compromise
For organisations where connecting any system to the internet is not an option — defence networks, critical OT environments, BBN3 government infrastructure, or highly regulated financial systems — Gatekeeper runs fully air-gapped on your own hardware with zero external dependencies.
- No cloud services at runtime
- Local database, no telemetry
- Offline CVE feed import
- Internal TLS-only comms
Core capabilities
What air-gapped Gatekeeper delivers
Zero internet dependency
Every component of Gatekeeper runs on your own hardware. No external calls are made at runtime. Supabase runs as a self-hosted instance on your infrastructure. No telemetry, no cloud services, no callbacks.
Local data residency
All asset data, incident logs, compliance evidence, credentials, syslog entries, and SIEM events are stored exclusively on your local database instance. Data never transits an external network.
Internal agent communication
Remote node agents communicate with the Gatekeeper platform server over your internal network using the Supabase Realtime protocol. No external relay server is involved in the data path.
Offline CVE feeds
NVD and CISA KEV vulnerability feeds are imported as periodic offline bundles. CVE-to-asset correlation runs entirely within your environment. No live external lookups are required.
Encrypted at rest & in transit
All data is encrypted at rest on the local Supabase instance. Internal TLS (TLS 1.3) is used for all platform-to-agent communication, even within the air-gapped network.
Full audit trail on-prem
Every user action, configuration change, and system event is logged in the local activity log. Syslog entries from network devices are ingested and retained locally. No logs leave the perimeter.
Infrastructure requirements
What you need to get started
Target environments
Who deploys air-gapped Gatekeeper
Defence & intelligence
Networks processing classified information that must never connect to civilian internet infrastructure.
Critical infrastructure
OT/ICS environments, power grids, water management systems requiring complete network isolation.
BBN3 government
Dutch government systems classified at the highest BIO level (BBN3) that prohibit cloud connectivity.
Regulated financial
Financial institutions subject to DORA or internal policies prohibiting third-party cloud data processing.
Full feature parity
No capabilities removed for air-gapped environments
Air-gapped Gatekeeper includes every module available in the cloud-hosted version: network discovery, CMDB, IPAM, ITSM, SIEM, SOAR, MDM, compliance, AD integration, switch connector, FortiGate integration, sites & racks, and the AI assistant. The AI assistant uses a locally hosted model when running in full air-gap mode.
- SIEM with offline threat feeds
- AI assistant (local model)
- MDM for on-network endpoints
- Multi-tenant with full RBAC
- Compliance frameworks (all 60+)
- Sites, racks, and rack diagrams
Architecture overview
Strict security requirements
Deploy Gatekeeper inside your perimeter
Contact us for air-gapped deployment packages, installation guides, and offline CVE feed subscriptions.
Explore more solutions
See how Gatekeeper fits your specific environment
NIS2 for Municipalities
Art. 21–23 compliance for local government
BIO for Government
Baseline Informatiebeveiliging Overheid
MSP Multi-tenant
Multi-tenant architecture for service providers
On-prem vs Hybrid
Choose the right deployment model
Healthcare
Medical device security & NEN 7510
Finance & DORA
ICT risk management for financial services
Utilities & OT
SCADA/ICS security for critical infrastructure
Education
Campus network security & BYOD management
