Host Identity Protocol - Making Secure Networking HIP Again

The old address-defined networking paradigm of blindly networking everything is problematic at best… unless you’re a hacker. But now, there’s a better way. One that’s HIP to be precise!

HIP—which stands for Host Identity Protocol—moves beyond the old way of networking. Instead, HIP only networks devices with provable host identities. And it does so in a way that shuts out hackers, while making it easy for devices to automatically join a HIP-based network.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 2

Mistake #2: ACLs–A set of rules that are made to be broken

 

There’s an old saying that confidently declares, “Rules are made to be broken.” It’s mostly attributed to American five-star general and hero of WW II, Douglas MacArthur. In the right context, it’s meant to be a motivational message, trying to inspire people to think outside the box and not be afraid to chart their own course. When misinterpreted, especially when referring to solutions for network security, the old adage can be devastating.

Tempered Networks Partners with NTT Advanced Technology Corporation

SEATTLE, FEBRUARY 7, 2018Tempered Networks, Inc., the pioneer of Identity-Defined Networking (IDN), today announced that NTT Advanced Technology Corporation (NTT-AT) has agreed to resell Tempered Networks’ Identity-Defined Networking (IDN) solution through Terilogy Corporation, Tempered Networks’ exclusive distribution partner in Japan.

Identity-Defined Networking (IDN) - Taking Network Security to the Next Level

If you’re in IT or stationed in a NOC you know there’s a fundamental conflict between providing access to networks and securing sensitive data and systems. And when the network is based on Internet protocols designed to allow any computing device to communicate with any other, it creates an environment ripe for hacking, deception, and data breaches – further complicating you’re already challenging responsibilities.

Uncovering Networking Pain Points - What Do IT Execs Think?

We know what we think, but what do other IT professionals think when it comes to networking pain points? We recently worked with IDG Research and conducted a five-question survey in an effort to better understand the primary pain points surrounding the integration of traditional enterprise networks with cloud implementations. So who did we ask? Respondents were required to work in an IT-related function at the Director level or above for an organization with 500+ employees.

Get your life back from the network cartel

I’ve been in enterprise networking and security for nearly 30 years. In that time I can truly say that I’ve seen it all. After spending pretty much all of my calories in the world of IT, you can imagine that I have a long list of ‘lessons learned’. Lucky for you I won’t go through them now. Instead, my unsolicited advice to you when it comes to networking is: Don’t compromise. Simplicity and security ought to be attached at the hip and you shouldn’t have to sacrifice one for the other.