Recently I was meeting with a prospective customer, explaining how we could help securely connect their building automation systems. He was interested, but skeptical. He asked a single question that made all the difference: “Can you get rid of my BACnet Storms? I’ve been trying to figure out how to stop them for years.”

When I said “yes” and explained how our Identity Defined Networking solution would restrict BACnet traffic to an encrypted tunnel, separate from other IP network traffic, his eyes lit up. “How fast can we get a POV in place?” Honestly, I don’t think we’ve ever had an order that fast.

The primary objective of our building automation customers is securing systems that communicate across a corporate IP network—effectively shared and untrusted--and protecting them from hackers. However, the ability of our solution to effectively eliminate BACnet Storms has been a revelation. It’s one of the side benefits of using the Host Identity Protocol (HIP). HIP gives us the ability to move away from vulnerable ‘address-defined’ networking to identity-defined networking that’s based on unique crypto-identities. Our identity-defined overlays seamlessly segment BACnet traffic without requiring any changes to your network infrastructure.

I knew about BACnet storms before I came to Tempered Networks, but had never known of an effective way to prevent them. Now I do. It’s just one more amazing thing I discover daily about the capabilities of our IDN solution and HIP. If you are struggling to figure out how to stop BACnet storms on your network, we would love to help you. “Years” is too long to wait for a simple, secure solution to a networking nightmare.

Wednesday, July 19, 2017 By Erik Giesa