We deliver a simpler approach to securing and isolating your critical infrastructure based on trusted machine identities. Eliminate the need for internal firewalls and VPNs for secure access and segmentation with a single solution that is fast to deploy and radically secure.
50% Lower CapEx and
OpEx through BAS
Connect and Revoke BAS
97% Faster, with little to
no network changes
90% Reduced Attack
Surface through cloaking,
Penn State University improved security by segmenting their BACnet systems for over 640 buildings
How they did it →
"Tempered Networks gave us a simple way to achieve end-to-end private networking for our Building Automation network that's resilient, scalable, and secure. In less than 20 minutes, we were able to deploy our first cloaked overlay network without having to modify systems or involve IT."
Facility Automation Services,
Penn State University
Segmentation Alternatives for BAS
Systems are Complex and Costly
Connecting modern and legacy BAS (including HVAC, lighting, water, elevators, and more) helps you achieve greater cost-efficiencies through centralized control and monitoring. However, securely connecting and segmenting buildings in geographically distributed areas across separate and often shared networks is significantly complex and costly.
This complexity forces organizations
to deal with issues such as:
Increased organizational risk from lack of segmentation and isolation
Decreased building efficiency from lack of centralized data collection
Decreased network performance and up-time due to broadcast storms
Traditional IT solutions are not the answer. Technologies such as firewalls, VPNs, ACLs, and VLANs were not designed for energy environments. They require significant time and expertise to deploy and manage, yet still remain vulnerable to breach due to insufficient security and segmentation.
We have a better solution that solves these challenges.
"It's very user intuitive. We were able to put the solution together right out of the box without any engineering to start with" - Tom Walker, Penn State University.
Simple, Secure, and Segmented
Smart Building Networks
We deliver peer-to-peer encrypted networks that make it simple to connect and micro-segment BAS across separate buildings and networks, with little to no change to existing infrastructure.
With a simple plug-and-play deployment model, you can now easily and quickly integrate systems across the LAN and WAN, without heavy IT involvement. We enable you to reduce costs through improved efficiency and predictive maintenance with BACnet traffic isolation and centralized control of distributed buildings.
Easily isolate and micro-segment BAS networks off the corporate network
Lower Operational Costs
Securely connect previously separate systems for better business intelligence and improved building efficiency
Better Network Performance
Improve network availability and performance by eliminating broadcast storms
Request a Meeting
Find out how Tempered Networks can help you.
First step is scheduling a meeting - please complete the form and we’ll take it from there.
Simple and Fast Deployment
Most customers will deploy hardware such as the HIPswitch 150 in front of buildings in order to cloak and segment the building control systems. Some are even moving towards granular segmentation of systems within the building using the smaller, more cost-effective HIPswitch 75.
The HIPrelay is the world's first identity-based router that connects systems and buildings across separate networks, and can be deployed on-premises or in the cloud. The Conductor is the orchestration engine that manages policy for all distributed HIP Services (HIPswitches, HIPservers, and HIPclients), delivering simple control of the network.
The Conductor Delivers Simple and
Centralized Network Control
Eliminate the complex and manual configurations associated with traditional IT solutions through simple point-and-click policy orchestration. Create, deploy, and disconnect overlay networks in seconds, with little to no change to existing network infrastructure.
Policy Orchestration That’s Point-and-Click Simple
Easily create isolated network segments and configure policy using the radio buttons. This simple process replaces the multiple steps of security and network configurations (using network addresses, ports, certificates, ACLs, and VLANs, and more) typically required by IT staff.
Verify Overlay Network Configuration and Compliance Quickly and Easily
The Visual Trust Map allows you to immediately validate communication policy between protected machines, as well as their HIP Services. With greater control of your network, showing segmentation for regulatory compliance reporting and security audits becomes quick and easy.