“Giving access to our network for our vendors' technicians was incredibly complex, time-consuming (provisioning could take two weeks) and our network was exposed once they were in. We had no way to easily and quickly provide specific access only to the system they were maintaining.
With Tempered, we designed a very simple and hardened overlay network we call VendorNet which took less than a few hours to design. My team can now enable and revoke remote access to any specific device on my network without changing existing infrastructure or worrying if the vendor could use that system to gain access to others. IDN prevents any network connection to or from unauthorized devices and can't be spoofed.”
Network Administrator, Fortune 500 Retail Company
Vendors, contractors, and others need access to machines and systems on the network, however, enabling segmented and restricted access down to individual devices on the network is significantly complex. The time, expertise, and budget needed to provision and manage firewalls, VPNs, routers, switches, ACLs, and VLANs every time someone needed access was impractical, and still resulted in vendors or partners having lateral access to the entire network.
People and Process Challenges
Our customers have eliminated the complexity, attack vectors, and costs associated with traditional IT solutions by adopting an identity-centric model for resource access that’s simpler and more secure. With IDN, you can deploy secure and micro-segmented networks in minutes, rather than days or weeks compared to traditional IT solutions. And even better, the cost is a fraction of those alternatives. Authorized 3rd parties now have isolated connectivity to individual resources on the network from any location, across any transport.
Our customer was able to securely connect 25+ vendors and contractors to individual devices and network segments on their corporate network. Unlike traditional IT solutions, with Tempered Networks
every vendor is isolated across its own encrypted and segmented overlay network that can’t be violated.
*Traditional IT solutions are the use of firewall rules, NAC, VPNs, switch and router ACLs, digital certificates, cellular modems, VLANs, etc.
*FTE - hours worked by one employee on a full-time basis.
Tempered Networks’ scalable orchestration engine was designed to be extremely easy to use with no advanced technical training and requires little to no change to existing infrastructure. Unlike the many complex, fragile, and disruptive steps associated with traditional IT solutions, our customers eliminate complexity, cost, and attack vectors through point-and-click policy orchestration.
First, our overlay network transparently creates cryptographic machine identities for every device to eliminate spoofing.
Second, every protected devices' network connections are automatically authenticated and authorized between trusted devices before data transport and exchange. Our unique network-level authentication creates verifiable trust segments that can't be discovered or exploited.
Third, all connections are transparently encrypted and encapsulated enabling non-disruptive and secure traversal across any type of network - public or private. Every device can now be quickly connected and protected across any LAN or WAN, segmented across any network and made invisible to hackers.
Click to expand
Trusted end-to-end connectivity with point-and-click simplicity to add, disable, and revoke machines.
Click to expand
Challenges with Traditional IT Solutions
Solution with Tempered Networks