Secure Networking. Sorted.

Freedom from IP management with trusted Identity-Defined Networking


IDC Technology Spotlight

The Imperative of Merging Identity with Software-Defined Networks

Find out more

Identity-Defined Networking

Seamlessly safeguard business critical assets and endpoints with built-in trust--wherever they are located—across physical, virtual and cloud environments.

Read More

CEO Opinion

CEO Jeff Hussey, gives his opinion on why he cares about the 'Internet of Important Things', and how the internet needs to change.

Watch Video

M2M Cellular Connectivity

Tempered Networks’ carrier-agnostic connectivity solution gives you complete control of your M2M communications—with end-to-end encryption—at the lowest TCO.




Learn More

Cloaking Technology

With our breakthrough technology leveraging Host Identity Protocol (HIP), Tempered Networks cloaks your devices, critical assets and vulnerable endpoints, making them invisible from the underlying network. Attackers cannot hack what they cannot access.

Watch Video

Changing IP communications

A brief summary of Host Identity Protocol (HIP) - Understand why the core of our technology is considered a game changer in IP communications



Read the Whitepaper

What people are saying about us

SC Magazine - 2015 Cybersecurity Innovator

Network World - New approach to Industrial IoT security

Computer Weekly - New way of securing endpoints





Learn how we can help you today


We can help you today with:

  • Cloaking vital systems
  • Reducing attack surface
  • Immediate OpEx savings


Please contact me
Red Herring N. America Winner

Red Herring N. America Winner

2016 Security Innovator

2016 Security Innovator

Awarded by SC Magazine

25 Coolest Network Security Vendors

25 Coolest Network Security Vendors

Awarded by CRN

Cybersecurity 500

Cybersecurity 500

World's hottest security companies

2014 North American Entrepreneurial Company of the Year

2014 North American Entrepreneurial Company of the Year

Awarded by Frost & Sullivan

Securing Fortune 500<br>Companies

Securing Fortune 500

Hardened, Resilient and Simple Security

Automated Orchestration

End-to-End Encryption


Device-Based Whitelisting

“To ensure we follow security best practices, securing our critical control network was our top priority. Tempered Networks allowed us to do that. Set up and usability was quick and easy.”

- Bruce Hoffman: Network Engineer, Franklin PUD

Trusted Communications

Explore our security blog and latest news, or


Tempered Networks and the Security EcoSystem

Guest blog by Russel Jensen, Network and Security Practice Lead, Sysorex Inc. “The best block is to not be there” – Mr. Miyagi Designing, installing, and maintaining your company’s infrastructure can be one heck of a job. I’ve been doing network architecture for about 20 years now and the best explanation I’ve ever found to tell people what I do is still, “I make sure packets go from point A to point B, and back again”. Horribly simplified, but if [...] Read More

If only time was a renewable resource

Contrary to what Mick Jagger so poetically crooned in a rock n’ roll classic from 1964, time is not usually on our side in today’s highly competitive global business marketplace. [...] Read More

Why I left an amazing company to work at Tempered Networks

I recently left a fantastic company and a team that I helped build over the last four years.   ExtraHop was growing rapidly and in fact we set a record [...] Read More

It’s time to bring security and networking together

One of the fundamental flaws with the way IT networks are constructed today is that many systems architects and administrators continue to view networking and security as two separate entities. [...] Read More