Who we are

Who we are

At Trout, we believe cybersecurity and the future of the industry are among the most pressing challenges companies face today. If you're passionate about solving these critical issues, we invite you to speak with our team.

At Trout, we believe cybersecurity and the future of the industry are among the most pressing challenges companies face today. If you're passionate about solving these critical issues, we invite you to speak with our team.

Trout Values

Our values

Our values

Roll up your sleeves

There is a time for thinking, and a time for building. We roll out our sleeves and build solutions. For our customers, for ourselves, and for the broader community,

Be humble


Cybersecurity and networking are complex, fast-speed fields, with incredible experts everywhere we look. We are fortunate to learn from them everyday.

Don't release crap


We place hardware in factories for years to come. It's our duty to create genuinely extraordinary, secure, and reliable products prepared for the test of time.

Promote no-BS culture


Embrace a no-BS culture through straightforward, clear and honest discussions.

Data always gives you a seat at the table


If you see something and can back it up with data, the world is your oyster.

Go fishing once in a while


We are in it for the long run, don't burn yourself.

Trout Location

Our team span several cities

Our team span several cities

Kingston NY, USA
Dublin, Ireland
Paris, France

Blog

Check out our blog

Check out our blog

From manufacturing to defense, on-site systems face the challenge of connecting legacy technology with modern solutions, enabling secure data flow, access, and compliance.

From manufacturing to defense, on-site systems face the challenge of connecting legacy technology with modern solutions, enabling secure data flow, access, and compliance.

Where the Packets Roam: Why OT Security Needs Unity, Not a Patchwork

How to Configure YubiKey with Trout Access Gate

Ivanti Avalanche : Multiple Vulnerabilities Could Allow Authentication Bypass

Securing the Industrial Internet of Things: A Modern Approach for IT and Network Engineers

Subscribe to Newsletter

Subscribe to receive Trout's blog posts, whitepapers, and updates delivered directly to your email.

Where the Packets Roam: Why OT Security Needs Unity, Not a Patchwork

How to Configure YubiKey with Trout Access Gate

Ivanti Avalanche : Multiple Vulnerabilities Could Allow Authentication Bypass

Securing the Industrial Internet of Things: A Modern Approach for IT and Network Engineers

Subscribe to Newsletter

Subscribe to receive Trout's blog posts, whitepapers, and updates delivered directly to your email.

Subscribe to Newsletter

Subscribe to receive Trout's blog posts, whitepapers, and updates delivered directly to your email.

Where the Packets Roam: Why OT Security Needs Unity, Not a Patchwork

How to Configure YubiKey with Trout Access Gate

Ivanti Avalanche : Multiple Vulnerabilities Could Allow Authentication Bypass

Securing the Industrial Internet of Things: A Modern Approach for IT and Network Engineers

Subscribe to Newsletter

Subscribe to receive Trout's blog posts, whitepapers, and updates delivered directly to your email.

Subscribe to Newsletter

Subscribe to receive Trout's blog posts, whitepapers, and updates delivered directly to your email.