Tempered Networks named ‘2015 Security Innovator’ and praised for cryptographic trust management, orchestration, and the ability to protect ‘things’ that cannot protect themselves
SEATTLE, DECEMBER 15, 2015 –Tempered Networks, Inc., a provider of secure connectivity for business critical infrastructure, communications and information, today announced that it has been recognized by SC Magazine as a 2015 Security Innovator for security infrastructure. Tempered Networks was also honored by SC Magazine in last year’s review of 2014 Security Innovators.
According to the SC Magazine write-up by Peter Stephenson, technology editor, “Tempered Networks’ system uses cryptographic trust management and the company’s orchestration tool, the Conductor, to manage the trust relationships in real time. This approach cloaks devices in an overlay network on top of TCP/IP, taking away the IP footprint. This tends to simplify networking because the overlay is a flat network. Viewing this Innovator’s system in the context of the kill chain, it stops the recon step. The idea is that you can’t breach what you can’t see.”
“It’s an honor to be recognized by SC Magazine as a leading security infrastructure innovator,” said Jeff Hussey, CEO of Tempered Networks. “We are pioneering this market and have taken a different approach from most traditional security solutions, as we tackle the root cause of insecure IP networks using HIP (Host Identity Protocol) and automating trust relationships through orchestration. In the crowded cyber security market, it’s quite gratifying that Tempered Networks is rising above the noise and making a positive impact on customers—not just for security, but also for network simplification.”
About Tempered Networks
Tempered Networks is the pioneer of Identity-Defined Networking (IDN), unifying networking and security with a simplified approach that removes the constraints of IP networking. Our elastic and fully encrypted IDN fabric protects every connected resource with a unique crypto identity, instead of a spoofable IP address, enabling you to cloak any IP or serial-enabled endpoint, machine or network--with no IP modifications. For the first time, any network and connected resource can be orchestrated, cloaked, and encrypted from the start. Device-based trust is flexible and portable and extends from any external and public cloud network to internal network hosts and clients. Any IP resource can now be instantly provisioned, moved, or revoked, making your network as adaptable as software, more secure, and simpler to manage. For more information go to www.temperednetworks.com.
Forward-looking statements. Certain statements contained in this press release may constitute forward-looking statements. Such statements include, for example, statements regarding the Company’s or management’s beliefs, expectations, estimations, plans, projections and similar statements. Any such forward-looking statements involve risks, uncertainties and other factors that may cause the Company’s actual results and performance, or industry results to be materially different from any results or performance expressed or implied by such forward-looking statements. These forward-looking statements speak only as of the date of this press release and there can be no assurance that the results and events contemplated by such forward-looking statements will, in fact, occur. The Company expressly disclaims any obligation or undertaking to release any updates or revisions to any forward-looking statement contained herein.