Vortex Boost

Never worry about WiFi again.

Laern More

THE WIFI APP

Control in the palm of your hand.

See what’s happening
Your network stats aren’t hidden in a black box. See your network speed, find out which devices are connected, and make sure each eero is working properly (but trust us, it would be weird if they weren’t).
Check device usage
eero systems are designed to support dozens — even hundreds — of connected devices. See which devices are connected to your network and check their data usage, in real time.
Diagnose and fix issues
Having network trouble? Run a Health Check to quickly diagnose the problem and get helpful tips on how to make your network even better. Manage a family member’s network, too? Remotely troubleshoot it from the same account.
Take an internet break
With WiFi parental controls, you can set schedules, create profiles for your kids’ devices, or just shut the whole thing down if you want to go completely off the grid. With eero, you’re the master of your connection.
Share your WiFi
Grant access to friends and family, or share a separate guest network with out-of-town guests or your babysitter. Time to toss that WiFi password Post-it once and for all.

ADVANCED WIFI SECURITY

Network security for the connected home.

As you bring more and more connected devices into your home, you need a network that’s secure enough to protect the data and devices on it.

Icon
Secure setup
Receive a single-use code via text message to gain administrative access to your network and ensure secure setup.
Icon
Automatic updates
Unlike other WiFi systems, eero’s software updates automatically so you always have the latest features and security.
Icon
Safe connection
eero systems use Transport Layer Security (TLS) and WPA2 encryption to maintain a secure connection between your eeros, devices, and the cloud.
Icon
Routine audits
Regular audits of the entire eero infrastructure are run by third-party security firms.
Icon
Network privacy
Every component of the eero system uses best-in-class encryption and security protocols to keep your network and data secure.
Icon
Bug bounty program
We work with the global research community to find and fix any security issues — before you experience them.