When was the last time you saw someone cruising to work in a Gremlin? Unless it was a movie character, we’re guessing it wasn’t very recently. The AMC Gremlin, which launched in 1970, has achieved cult-like status among car collectors, but you’re not likely to see one on the roads today.

What if I told you that the language powering most of our Internet communications today is the technology equivalent of the Gremlin? Because that’s what it really is.

Four Score and Seven Years Ago[...]

The protocol we’re using today to power global commerce over the Internet was developed almost 50 years ago. Development efforts in the late 1960s and early 1970s created the TCP/IP protocol, which was originally designed to allow smaller local networks to communicate between short distances in ways they had never before. However at the time of its inception, reliability was the only concern as the idea of security was a man with a machine gun guarding the facility. Despite being an incredible development, as a result we are left with a protocol that is incredibly reliable, yet inherently unsecure as trusted identities was not part of the design. This has led to today’s environment, where components are bolted-on for security, rather than baked in from the start. And given the number of data breaches we see in the headlines, we can all see how that’s working out.

The Much Needed Evolution of IP

The time has more than come to re-evaluate the Gremlin of Internet protocols, TCP/IP. The Internet Engineering Task Force recently approved a standard-track network security protocol: The Host Identity Protocol, which many in the IETF community recognize as the next big change in IP-architecture. The protocol has been under development for nearly 20 years, in coordination with standards bodies, as well as many large corporations (Verizon, Ericson, Yokogawa, etc.).
HIP is an alternative encryption technology that was first deployed within the defense and aerospace industry, where nation-state attacks occur every hour. Specifically designed to be secure by default, HIP shifts the network trust model completely, by introducing trusted cryptographic identities within any network. It’s like the Gremlin riding around inside an armored truck.

The threat landscape for any organization has radically changed within the last decade. To meet these new challenges, we need to step away from the traditional solutions that have been protecting networks for a long time, and into the 21st century. Tempered Networks unique value proposition is this:  Our technology is purpose-built to provide secure connectivity—at scale. And, you don’t need to be Einstein to manage it. Now is the time for a HIP revolution!

P.S Pick up the book about Host Identity Protocol!

Beyond HIP: The End To Hacking As We Know It, Richard Paine

 

0 Comments
Monday, March 21, 2016 By Anonymous (not verified)