Five gold star icons in a horizontal row.
Product - Edge Deployment

Guard Hawk Talon

Guard Hawk Talon is an on-site telemetry collector that securely brings physical security system data into the Command Platform - without changing your network.
Donut chart showing Alert Severity Distribution with total of 71 categorized security signals: 42 informational, 18 suspicious, 8 policy violations, and 3 security incidents.
Five gold star icons in a horizontal row.
What It Is

Secure Telemetry at the Edge

Guard Hawk Talon is a lightweight on-site collection layer that enables secure, controlled telemetry ingestion from infrastructure systems - designed to operate within existing network boundaries without disrupting critical environments.
Red clock icon showing the time as 3 o'clock.
Deployment
Deployed On-Site
Detect unauthorized access attempts, role changes, and system failures — correlating events across doors, controllers, and identity systems.
Red icon of two stacked server racks with circular indicators.
Collection
Collects Telemetry
Connects within approved VLANs. Collects syslog, SNMP, and other telemetry from physical security systems.
icon
Security
Stays Within Boundaries
Works within client network boundaries — no external agents, no proprietary lock-in, no infrastructure changes required.
Red zigzag line resembling an abstract heartbeat or pulse symbol on a white background.
Forwarding
Deployed on-Site → Sends to Command Platform
Telemetry is securely forwarded to the Guard Hawk Command Platform for detection, correlation, and alerting.
Five gold star icons in a horizontal row.
Why It Matters

Built for Real Environments

ONBOARDING FRICTION
Reduces Deployment Complexity
Deploy quickly without disrupting existing systems or requiring complex network reconfigurations.
VISIBILITY
Expands Coverage
Reach systems that traditional deployment models can't access - segmented OT/IT environments included.
NETWORK COMPLIANCE
Works Within Boundaries
Works within approved client network segments, respecting VLAN architecture and existing security policy.
AGENT-LESS
Supports Agent-Less Environments
Ideal for environments where installing agents is not feasible or permitted due to policy or architecture constraints.
Five gold star icons in a horizontal row.
Deployment

How its works

A unified detection platform connecting physical security systems and IT infrastructure.
01
On-Site Deployment
Talon is deployed physically within the customer environment.
02
Network Segmentation
Connects within approved network segments — no boundary crossing.
03
Telemetry Collection
Collects via syslog, SNMP, and other supported protocols.
04
Secure Forwarding
Telemetry is securely forwarded to the Guard Hawk Command Platform for detection, correlation, and alerting.
Five gold star icons in a horizontal row.
Use Cases

Deployed Across Complex
Environments

Red icon of a multi-story building with multiple windows.
Warehouses
Distributed access control across large facilities
Red shield icon with a checkmark inside and four connection points around it.
Physical Security Networks
Segmented VLAN environments
Red factory icon with three smokestacks.
Industrial Facilities
OT-adjacent, segmented environments
Red icon of a three-layer server or database stack.
Multi-Site Environments
Centralized visibility across many locations
Five gold star icons in a horizontal row.
Part of the Ecosystem

How Guard Hawk Fits into the Guard Hawk Platform

Talon extends the Command Platform - enabling broader visibility across environments where traditional deployment models may not apply.

Together, Talon and the Command Platform provide end-to-end detection from the edge to the core - giving your security team complete situational awareness.
Facility map simulation showing monitored zones: Loading Dock and Server Room in alert (red), Lab A and Executive Suite in warning (orange), Main Lobby, Office Floor, and Parking Garage as normal (green).
Five gold star icons in a horizontal row.
Differentiation

Why Talon Is Different

Red symbol of a plug with prongs inside a circle crossed by a diagonal line indicating no electrical connectivity or power.
No agents required
Deploy without installing software across endpoints or systems.
Red shield icon with a checkmark inside, symbolizing security or protection.
Built for physical security systems
Purpose-built for access control, surveillance, and infrastructure.
Red stacked layers icon composed of three parallelograms with gaps in between on a white background.
Designed for segmented environments
Operates within restricted and isolated network zones.
Red Wi-Fi signal icon with three curved lines above a dot on white background.
No network reconfiguration
Works within existing infrastructure without disruption.
Red shield icon with a checkmark inside, symbolizing security or protection.
Extends beyond traditional IT visibility
Brings physical and cyber systems into one detection layer.
Five gold star icons in a horizontal row.
Get Started

Explore Talon Deployment