Tuesday, May 29, 2018
It was so much easier to identify the bad guys in the days of the Wild West. You could spot them coming from a mile away. They rode into town rather brazenly on horseback, wearing a black hat, wreaking of cheap whiskey, and harboring all sorts of ill intentions. In fact, they pretty much announced to the entire town that they were there to steal everyone’s money. Unless they ran into Wyatt Earp or Wild Bill Hickock, nobody was going to stop them.
Many years later, as the world shifted toward the Technological Age, the criminal element evolved from gun-slinging outlaws to cyber outlaws. One of their most preferred methods of thievery—ransomware.
Imagine waking up one morning and trying to login to your company’s system through its Out of Band Management (OOBM) interface. It’s a work from home day, so once you get your k-cup full of coffee, it’s off to the home office to log in remotely. Upon attempted login, however, you see something like the following message on your screen …
“Your hard disk is encrypted using RSA 2048 asymmetric encryption. To decrypt files, you need to obtain the private key.
It means we are the only ones in the world to recover files back to you. Not even God can help you now.
If you want your files back, send an email to … We’ll give you instructions for transferring bitcoin to our wallet address and how to get your files back.”
That’s pretty close to the message many users got recently when they attempted to log in to their HPE iLO4 management interface. It’s not quite Jesse James busting through the swinging doors of your saloon with guns a-blazing, but it sure is effective.
Much like the law-abiding citizens of the Wild West needed increased security to protect them from the bad guys, you need increased security to protect you from the cyber outlaws of today.
Identity Defined Networking (IDN) provides simple and secure OOBM access by creating a fully micro-segmented, private overlay network that is virtually invisible to cyber outlaws around the world. Only whitelisted devices can connect to it, but those end-points that are verified and trusted can connect from anywhere, eliminating the need for complex firewall rules, certificates, or any other bulk that could slow down your communication speeds. IDN can also be connected to any medium including Wi-Fi, Ethernet, cellular, or radio transmission.
Cyber outlaws attempting a form of ransomware similar to the one previously mentioned would never be able to break through the rock-solid security of IDN because they would never see it, to begin with.
Furthermore, unprecedented network security meets unprecedented usability in our IDN architecture via The Conductor, which is a simple, point-and-click user interface to allow instantaneous policy orchestration with zero expertise required to implement.
With IDN from Tempered Networks, you have a choice for protecting your most valuable digital assets: keep fighting the cyber outlaws with yesterday’s technology or upgrade your security, reduce complexity, and enjoy peace of mind knowing that you’re heading into a gunfight with a bullet-proof vest.
For more information about our ground-breaking IDN technology, please contact us here: www.temperednetworks.com/contact