Smart Buildings

Use Cases

Simple and Secure Networking for Smart Buildings

Peer-to-peer connectivity and micro-segmentation for Building Automation Control Networks (BACnet)

What our Smart Building Customers Experience

50% Lower CapEx and OpEx
through BAS network simplification

Connect and Revoke Devices 97% Faster with little to no network changes

90% Reduced Attack Surface
through cloaking, micro-segmentation, and encryption

See how Penn State Segmented Their BACnet Systems

The Challenge

Connecting and Protecting Building Automation Control Networks (BACnet)

The complexity and ineffectiveness of traditional IT solutions has left building automation teams feeling ill-equipped and exposed. The time, expertise, and budget required to connect and protect building control systems in every building across separate networks is impractical, yet still doesn’t prevent hacker reconnaissance and lateral attacks.

Network

Complex network dependencies prevent simple LAN/WAN connectivity

Disruption caused by infrastructure and maintenance changes

Broadcast storms making systems unavailable

Security

Flat L2 networks create a large cyber-attack surface

Inability to protect against horizontal L2-L4 network attacks

Lack of machine-to-machine encryption exposes building controls

People and Process

Limited staff, security, and network expertise

Lack of quick audit capability across systems

Controlling network and security costs

The Solution

Fast, Simple, and Secure Smart Building Networks

Our customers have eliminated the complexity, attack vectors, and costs associated with traditional IT solutions by adopting a purpose-built approach for building automation controls that’s simpler and more secure. With IDN, you can deploy secure and micro-segmented networks in minutes, rather than days or weeks compared to traditional IT solutions. And even better, the cost is a fraction of those alternatives. Now you can easily connect and integrate building controls and IT systems across the LAN and WAN.

Business Impacts of Traditional IT Solutions vs Tempered Networks

Our customer was able to securely connect and segment 500 distributed buildings and thousands of building control systems across their large campus network. They were able to complete the project on time and significantly under budget, while providing a highly available and more secure overlay network model.

Let Us Prove It

"Tempered Networks gave us a simple way to achieve end-to-end private networking for our Building Automation network that’s resilient, scalable, and secure. In less than 20 minutes, we were able to deploy our first cloaked overlay network without having to modify systems or involve&IT"

Tom Walker, Facility Automation Services

Penn State University

Zero Trust Policy Orchestration and Micro-Segmentation in Minutes

Tempered Networks’ scalable orchestration engine was designed to be extremely easy to use with no advanced technical training and requires little to no change to existing infrastructure. Unlike the many complex, fragile, and disruptive steps associated with traditional IT solutions, our customers eliminate complexity, cost, and attack vectors through point-and-click policy orchestration.

First, our overlay network transparently creates cryptographic machine identities for every device to eliminate spoofing.

Second, every protected devices' network connections are automatically authenticated and authorized between trusted devices before data transport and exchange. Our unique network-level authentication creates verifiable trust segments that can't be discovered or exploited.

Third, all connections are transparently encrypted and encapsulated enabling non-disruptive and secure traversal across any type of network - public or private. Every device can now be quickly connected and protected across any LAN or WAN, segmented across any network and made invisible to hackers.

Setting Policy

Point-and-Click Simple Management

With one-click, our customers easily create peer-to-peer overlay networks that can’t be spoofed.
Visualizing Policy

Verify Compliance Quickly and Easily

The Visual Trust Map verifies creation and revocation of connectivity and segmentation between endpoints.

Simplified Network Deployments

Get control over your building automation systems by segmenting and cloaking your devices

Challenges with
Traditional IT Solutions

Inability to connect and collect system data from anywhere

High acquisition, deployment, and management costs

Misapplying firewall rules, ACLs, VLANs, and VPNs for segmentation

Lack of isolation to eliminate 'broadcast storms'

Network and security dependency errors open attack vectors

Enabling and revoking remote access to specific building controls

Solutions with
Tempered Networks

Instant overlay networks that connect and collect data from anywhere

Lower costs and fast deployment with no operational disruption

Cloaked LAN and WAN micro-segmentation with end-to-end encryption

Complete segment isolation eliminates 'BACnet storms'

Eliminates operational complexity and errors

Ability to instantly connect and revoke remote access to specific controls