How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 4

Mistake #4: Underestimating the Scope of Your Segmentation Needs


The world’s leading technology research and advisory company, Gartner, Inc. recently reported a rise of 31 percent in connected “things” worldwide from 2016 to 2017, which amounts to nearly 8.4 billion connected things last year.

When inventing something, you should try to think about what the consequences might be

These words were recently spoken by the man affectionately known as “The Father of the Internet”, Vint Cerf, in a recent NPR interview. Unfortunately, he didn’t apply that best practice to the invention he’s best known for. While he and his team created the vehicle that makes our entire world go round (i.e.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 3

Mistake #3: Separating Cloaking, Connectivity, and Encryption


A workable and effective solution for micro-segmentation comes down to the following simple mathematical formula:

Cloaking + Connectivity + Encryption = Successful Micro-Segmentation Solution (SMSS)

Take away any of those three critical elements and the formula just doesn’t work.

Host Identity Protocol - Making Secure Networking HIP Again

The old address-defined networking paradigm of blindly networking everything is problematic at best… unless you’re a hacker. But now, there’s a better way. One that’s HIP to be precise!

HIP—which stands for Host Identity Protocol—moves beyond the old way of networking. Instead, HIP only networks devices with provable host identities. And it does so in a way that shuts out hackers, while making it easy for devices to automatically join a HIP-based network.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 2

Mistake #2: ACLs–A set of rules that are made to be broken


There’s an old saying that confidently declares, “Rules are made to be broken.” It’s mostly attributed to American five-star general and hero of WW II, Douglas MacArthur. In the right context, it’s meant to be a motivational message, trying to inspire people to think outside the box and not be afraid to chart their own course. When misinterpreted, especially when referring to solutions for network security, the old adage can be devastating.

Tempered Networks Partners with NTT Advanced Technology Corporation

SEATTLE, FEBRUARY 7, 2018Tempered Networks, Inc., the pioneer of Identity-Defined Networking (IDN), today announced that NTT Advanced Technology Corporation (NTT-AT) has agreed to resell Tempered Networks’ Identity-Defined Networking (IDN) solution through Terilogy Corporation, Tempered Networks’ exclusive distribution partner in Japan.

Identity-Defined Networking (IDN) - Taking Network Security to the Next Level

If you’re in IT or stationed in a NOC you know there’s a fundamental conflict between providing access to networks and securing sensitive data and systems. And when the network is based on Internet protocols designed to allow any computing device to communicate with any other, it creates an environment ripe for hacking, deception, and data breaches – further complicating you’re already challenging responsibilities.

Uncovering Networking Pain Points - What Do IT Execs Think?

We know what we think, but what do other IT professionals think when it comes to networking pain points? We recently worked with IDG Research and conducted a five-question survey in an effort to better understand the primary pain points surrounding the integration of traditional enterprise networks with cloud implementations. So who did we ask? Respondents were required to work in an IT-related function at the Director level or above for an organization with 500+ employees.