IP complexity is holding your business back

A fundamentally flawed trust model drives network complexity and cost



The way we use IP is flawed

Currently, the IP address is used to determine both the identity and location of a device on the network. This dual functionality of the IP address lacks the basic mechanisms for security and mobility, which causes most networking and security challenges today. Even the creators of TCP/IP have acknowledged if they could go back and do it over again, they would include provable host identities from the start.

  Washington Post: Net of Insecurity - A flaw in the TCP/IP design




Vint Cerf: Co-creator of TCP/IP
The flawed foundation of IP



Host Identity Protocol Creators
A better IP architecture

Introducing trusted identities for security and networking

The Host Identity Protocol is an open standard that fixes the broken trust model of current IP networking, by introducing cryptographic identities and a new secure namespace. HIP was first proposed by Bob Moskowitz in 1999 as a way to solve the fundamental flaw in TCP/IP networking: using an IP address for both location and identity of a host or service on the network.

Ratified by the Internet Engineering Task Force (IETF), HIP delivers an improved IP architecture with authentication, authorization, and IP mobility based on cryptographic identities.

  A Primer on Host Identity Protocol - Dr. Andrei Gurtov


Bob Moskowitz - Father of HIP
Why HIP is revolutionary


Richard Paine
Author of "Beyond HIP: The End to Hacking as We Know It"


A proven (and much-needed) upgrade for IP networking

HIP has been in use for over 12 years at a Fortune 100 company to address security and networking challenges within the defense and aerospace industry until commercialized. Organizations now have a simpler approach to solving some of the most difficult networking and security challenges.