Protection
Beyond the Boardroom.

Your organisation has security; your personal world usually does not. Tirith closes that gap by protecting the devices, homes, travel, and connections surrounding you and your family, bringing them into a single controlled environment designed for individuals who cannot afford unmanaged risk.

100%
Environment Visibility
24/7
Threat Monitoring
<60s
Security Response
50+
Threat Signal Sources
VPN TUNNEL ACTIVE — LONDON NODE
DNS QUERIES PROCESSED: 14,882 TODAY
ALL DEVICES ENROLLED & HEALTHY
THREAT ADVISORY: ISTANBUL — MODERATE
BANDWIDTH WORKER: LAST RUN 18S AGO
WARDEN — OPERATIONAL
GATE VPN — OPERATIONAL
3 DNS THREATS BLOCKED THIS HOUR
VPN TUNNEL ACTIVE — LONDON NODE
DNS QUERIES PROCESSED: 14,882 TODAY
ALL DEVICES ENROLLED & HEALTHY
THREAT ADVISORY: ISTANBUL — MODERATE
BANDWIDTH WORKER: LAST RUN 18S AGO
WARDEN — OPERATIONAL
GATE VPN — OPERATIONAL
3 DNS THREATS BLOCKED THIS HOUR
TIRITH
DEVICES VPN DNS ASSETS THREAT ALERTS
THE TIRITH PARADIGM

The Personal Surface

Corporate security protects the office. It does not protect the devices your family carries, the networks in your homes, the vehicles you travel in, or the phone in your pocket while you are on the move.

That is where exposure now lives. Tirith closes that gap by bringing the devices, connections, and environments surrounding you and your family into one controlled view.

Unified Visibility
Every device, connection and asset in one view
Autonomous Sentinels
Four background workers monitoring 24/7
Zero Trust Architecture
Cloudflare Access + IKEv2 VPN + hardware key enforcement
CAPABILITY MATRIX

Enterprise Protection, Applied Personally

Built for the realities of life beyond the organisation.

Silent Device Enrolment

Every iPhone, iPad, and MacBook belonging to you, your family, and your household staff is brought under management without disruption. If any device is lost, stolen, or compromised, it is locked and wiped remotely within seconds — from anywhere in the world, without physical access.

FAMILY · HOUSEHOLD · STAFF

Access Only You Control

The command surface is protected by hardware key authentication — your YubiKey, nobody else's. No shared passwords. No recoverable credentials. Access cannot be delegated, phished, or socially engineered.

HARDWARE KEY · ZERO TRUST

Invisible Threat Blocking

Every website request from every enrolled device is silently filtered before it reaches the internet. Malware, phishing, and attacker infrastructure are blocked automatically — no action required from your family or staff.

ALWAYS ON · SILENT

Know the Risk Before You Arrive

Every location reported by an enrolled device is assessed against live government travel advisories, local crime data, and 50+ city-level risk profiles. You see a threat score — not raw data — the moment a family member arrives somewhere new.

TRAVEL · FAMILY SAFETY

See Where Everyone Is

Every enrolled device appears on a live private map — visible only to you and those you authorise. Tap any device to see its current threat level, location history, and the specific risks in that area.

LIVE MAP · LOCATION HISTORY

Private Encrypted Network

Every enrolled device connects through a private VPN that belongs exclusively to you — not a shared commercial service. Each person's access is independent. If one device is compromised, only that tunnel is revoked. Everyone else is unaffected.

PRIVATE · ISOLATED

Direct Alert to Any Device

Send a security alert to a single family member, a specific group, or everyone at once — instantly. No app to open, no action required from the recipient. Critical alerts land on the lock screen within seconds.

FAMILY · IMMEDIATE

Organised by Household

Group devices by family member, property, or role — spouse, children, estate staff, security team. View and manage each group independently. A single command surface that scales across multiple households and family offices without becoming complicated.

HOUSEHOLD · FAMILY OFFICE

Plain English Command

Your security officer manages everything through a natural language interface — no technical training required. Issue commands, revoke access, and send alerts in plain English. The system handles the rest.

AI-ASSISTED · NO TECHNICAL SKILL NEEDED

What's on Their Devices

A continuous audit of every app installed across enrolled devices — scored by risk category, flagged for gaps in privacy and security tools. Know if a family member has installed something they shouldn't, before it becomes a problem.

VISIBILITY · RISK AUDIT

Properties & Vehicles

Camera status, door locks, alarm states, and vehicle location — every property and vehicle in one view, alongside the devices and people you're already protecting. No separate apps. No separate logins. One picture of your entire estate, in real time.

PROPERTY · VEHICLE · ESTATE
THREAT INTELLIGENCE

Complete Visibility Across Your Environment.

3 PEOPLE · 6 DEVICES · 2 PROPERTIES · 1 VEHICLE · THREAT ASSESSMENT ACTIVE
TIRITH SENTINEL LOG STREAMING
SECURE
Sarah
SPOUSE · OXFORD, UK
THREAT SCORE: 12 / 100
ADVISORY
James
SON · ISTANBUL, TR
THREAT SCORE: 58 / 100
SECURE
Eleanor
DAUGHTER · NEW YORK, US
THREAT SCORE: 19 / 100
SECURE
Estate Staff
3 DEVICES · OXFORD, UK
THREAT SCORE: 10 / 100
6 DEVICES ONLINE — ALL PROTECTED
PROTECTION STATUS
3,847
SCANNED
11
BLOCKED
0.3%
THREAT RATE
ACTIVE PROTECTIONS
Malware Blocking
ACTIVE
Phishing Blocking
ACTIVE
Encrypted DNS (DoH)
ACTIVE
Custom Block Lists
ACTIVE
RECENT BLOCKS
malware-cdn-45.net
MALWARE
phishing-auth-verify.net
PHISHING
spyware-update-cdn.io
C2
THREAT INTELLIGENCE
THREAT LEVEL
ELEVATED
SCORE
3.2 / 5.0
Karaköy, Istanbul · James
COUNTRY
2.8
CITY +
+0.4
CRIME
MED
FCO ADVISORY ACTIVE
Turkey: Exercise increased caution. Petty crime and tourist targeting reported. VPN enforced on James's device.
SARAH & ELEANOR — CLEAR
Oxford & New York — no advisories active.
BANDWIDTH — MARCH 2026
18.4 GB
DOWNLOAD
4.1 GB
UPLOAD
22.5 GB
TOTAL
MONTHLY HISTORY
MAR 2026
22.5 GB
FEB 2026
31.2 GB
JAN 2026
28.7 GB
NOTIFICATIONS
HIGH
14:22
Blocked: malware-cdn-45.net (C2 pattern) — James's device.
ADVISORY
14:19
Tesla Model 3 departed Oxford geofence. Tracking active.
INFO
14:05
Oxford Residence front door opened. Alarm remains armed.
OK
13:48
Eleanor's iPad enrolled. All security policies applied.
SECURITY
THREATS
BANDWIDTH
ALERTS
Mobile Command

Security. In Hand.

Your entire security environment on your phone. Devices, properties, vehicles, and family members appear in one place with live status and clear alerts when something needs your attention.

Security — DNS Protection

Every DNS query across all enrolled devices scanned and filtered in real time. See total queries scanned, threats blocked, and the exact domains stopped — malware, phishing, C2 — broken down by category.

Threats — Live Location Intelligence

Your current threat level scored in real time from your location — country risk, city modifier, and local crime density combined into a single number. Active FCO advisories surfaced instantly when you enter a flagged zone.

Bandwidth — Encrypted Traffic

Monthly and all-time view of encrypted tunnel traffic across every device. Download, upload, and totals — with a per-month history so you can see usage patterns across your entire estate at a glance.

Alerts — Direct to Your Lock Screen

Every significant event — DNS block, geofence breach, door opened, vehicle moved, device enrolled — pushed to you the moment it happens. Severity-coded, plain English, no action required unless stated.

ASSET COMMAND

Beyond Devices. Every Asset You Own.

The Tirith control plane is being extended to encompass physical assets — properties and vehicles — in the same unified interface as your enrolled devices. No separate apps, no fragmented dashboards.

Oxford Residence
PRIMARY PROPERTY
SECURE
Security Cameras6 / 6 Online
Entry DoorsAll Locked
Alarm SystemArmed — Away
Last Motion14 mins ago
London Apartment
SECONDARY PROPERTY
SECURE
Security Cameras4 / 4 Online
Entry DoorsAll Locked
Alarm SystemArmed — Away
Last Entry3 days ago
Tesla Model 3
PRIMARY VEHICLE
PARKED
Battery78%
Estimated Range287 mi
LockedYes
Last JourneyOxford → London, 56mi
ONBOARDING

Operational in 48 Hours

Tirith is deployed by your dedicated implementation team. No IT department required on your side.

01

Principal Briefing

A private briefing with the Tirith security team. We map your threat surface — devices, properties, travel patterns, family members — and configure your deployment accordingly.

02

Silent Deployment

Your dedicated Tirith instance is provisioned on sovereign infrastructure. Enrollment links issued to each device. VPN profiles signed and delivered. Zero downtime, zero disruption to your team.

03

Continuous Watch

Four autonomous sentinels monitor your estate 24/7. Your security officer accesses the command surface via FIDO2-authenticated browser. You receive intelligence via the iOS app.

INFRASTRUCTURE

Yours Alone. From Day One.

Most security platforms are shared. Your data sits alongside thousands of other organisations on the same infrastructure, managed by people you have never met, under contracts that do not prioritise you. Tirith is different. Your deployment is provisioned on hardware dedicated exclusively to you. Nobody else has access to your data, your family's locations, or your threat intelligence — not even us.

Dedicated Hardware

Two hardened servers, provisioned for you and you alone. No shared tenancy. No co-location with other clients. Your family's data never touches infrastructure that anyone else uses.

Command server — device management & intelligence
Network gateway — encrypted VPN & threat filtering
Isolated from one another — breach of one affects nothing else

Zero Vendor Access

We deploy Tirith on your infrastructure and hand you the keys. We do not retain access to your data, cannot read your threat logs, and have no visibility into your family's activity. Your security posture belongs to you.

All credentials generated on your hardware at setup
Admin access protected by hardware key — yours only
When you leave, everything leaves with you

Always Watching

Four autonomous monitoring processes run continuously in the background — checking device health, pushing security policies, assessing location threats, and watching for anomalies. No human intervention required between incidents.

Device health — checked every 5 minutes
Location threat — assessed on every check-in
Security intelligence — enriched every 24 hours
"

My corporate security team is exceptional. But they stop at the lobby. Tirith starts there. My children, my properties, my travel — it is the first time I have had a single, honest picture of everything that could go wrong. And the first time I have had the tools to act on it.

PRINCIPAL — FAMILY OFFICE, LONDON
PRIVATE ACCESS

Not For Everyone. Deliberately.

Tirith is extended by referral to a small number of principals each year. Each deployment is personal, each infrastructure stack is yours alone. There is no waitlist, no self-serve trial, and no sales team.

REFERRAL ONLY · ALL ENGAGEMENTS UNDER NDA · NEVER COLD CONTACTED