Tempered Networks profile picture

Tempered Networks

Friday, April 6, 2018

In a shockingly short period of time in 2017, HBO, Equifax, and the U.S. Securities and Exchange Commission landed in what FoxBusiness labeled the Cyber hack hall of shame. Yahoo reported that a 2013 hack that was thought to expose 1 billion user accounts had in fact impacted all 3 billion accounts that existed at that time. And a reported hack of a global consulting and accounting firm is said to have compromised emails of multinational firms and government agencies.

More recently, a security researcher discovered that a flaw in the WPA2 security protocol that protects most modern Wi-Fi networks “can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos … Depending on the network configuration, it is also possible to inject and manipulate data.”

The attack surface for most enterprises is growing by leaps and bounds, and to a large degree we can blame it on the IP addressing scheme that provides hackers with a veritable roadmap to wreak havoc. Can you envision how many points of access your organization may need to defend? Frankly, it’s simply too much for your folks in network security to handle or manage!

This from Enterprise Strategy Group:

IP addresses essentially changed the world—from communication to commerce—but they were designed only to identify location and enable reliable connectivity. They were not built to establish identity or deliver security. As a result, in this age of limitless hacking and cyber-attacks, IT organizations must turn themselves inside out with complex solutions—combinations of firewalls, VPNs, routing policies, ACLs, VLANs, etc.—to try to make ubiquitous networked devices secure.

Consider this (frightening) scenario if you’re responsible for network security… your typical coworker probably has a smartphone, a tablet, a laptop, a streaming media device, a printer, router, a wireless gateway, and maybe even a smart thermostat. These devices may interact with other devices that your coworker’s spouse or kids have. Each of these devices represent a potential enterprise attack vector. So, with say 1,000 employees, you likely have between 5,000 and 50,000 vectors. All this before you even factor in enterprise desktops, servers, printers, etc. Then, of course, you include cloud connections, DevOps resources, VoIP phones, and anything else that may connect to your network and you begin to realize just how unmanageable network security really is! Definitely pretty scary. The only way to truly shrink this growing attack surface is to find a way to make your devices invisible to potential hackers.

GOOD NEWS! Today, host identity protocol (HIP) can deliver this much sought-after network cloaking solution. According to Stu Baily, CTO of Open Data Group and founder of Infoblox states:

With HIP, an IP address can be cloaked or hidden with a unique, non-spoofable identity-based address. It’s like retinal scanning of your network devices. This means a device or an entire network becomes invisible by default—you can’t breach what you can’t see.

We use HIP to provide products and services that comprise an encrypted Identity Defined Networking (IDN) fabric that protects every connected resource with a unique crypto identity, instead of a spoofable IP address, so enterprises can cloak any IP or serial-enabled endpoint, machine, or network—with no IP modifications.

IDN can help you overcome the threatening and ever-expanding attack surface. Contact us for a no obligation demo and we’ll guide you all the way to safety.