The old address-defined networking paradigm of blindly networking everything is problematic at best… unless you’re a hacker. But now, there’s a better way. One that’s HIP to be precise!
HIP—which stands for Host Identity Protocol—moves beyond the old way of networking. Instead, HIP only networks devices with provable host identities. And it does so in a way that shuts out hackers, while making it easy for devices to automatically join a HIP-based network.
There’s an old saying that confidently declares, “Rules are made to be broken.” It’s mostly attributed to American five-star general and hero of WW II, Douglas MacArthur. In the right context, it’s meant to be a motivational message, trying to inspire people to think outside the box and not be afraid to chart their own course. When misinterpreted, especially when referring to solutions for network security, the old adage can be devastating.
Why do bad things happen to good segmentation projects?
SEATTLE, FEBRUARY 7, 2018 – Tempered Networks, Inc., the pioneer of Identity-Defined Networking (IDN), today announced that NTT Advanced Technology Corporation (NTT-AT) has agreed to resell Tempered Networks’ Identity-Defined Networking (IDN) solution through Terilogy Corporation, Tempered Networks’ exclusive distribution partner in Japan.
If the current state of networking could be summed up in a word, that word would be “complex.” To understand our meaning, here’s a snapshot of just a few of the challenges that networking teams are struggling with:
If you’re in IT or stationed in a NOC you know there’s a fundamental conflict between providing access to networks and securing sensitive data and systems. And when the network is based on Internet protocols designed to allow any computing device to communicate with any other, it creates an environment ripe for hacking, deception, and data breaches – further complicating you’re already challenging responsibilities.
We know what we think, but what do other IT professionals think when it comes to networking pain points? We recently worked with IDG Research and conducted a five-question survey in an effort to better understand the primary pain points surrounding the integration of traditional enterprise networks with cloud implementations. So who did we ask? Respondents were required to work in an IT-related function at the Director level or above for an organization with 500+ employees.
I’ve been in enterprise networking and security for nearly 30 years. In that time I can truly say that I’ve seen it all. After spending pretty much all of my calories in the world of IT, you can imagine that I have a long list of ‘lessons learned’. Lucky for you I won’t go through them now. Instead, my unsolicited advice to you when it comes to networking is: Don’t compromise. Simplicity and security ought to be attached at the hip and you shouldn’t have to sacrifice one for the other.