Simple Point-and-Click Policy Based Orchestration
The Conductor is the orchestration engine that delivers centralized management of the IDN fabric and drives networking and security policies for HIP Services. As the intelligence behind an IDN deployment, the Conductor is designed to be extremely easy to use, even for staff without advanced technical training. You can now create hub-and-spoke or highly distributed mesh networks, without the traditional network challenges.
By automating network and security policies, it's easy to handle large scale deployments with thousands of devices across your hybrid data center, giving you better control of your entire enterprise network architecture. End-to-end or peer-to-peer encrypted networking, even for traditionally non-routable endpoints, is now possible and can be done in as little as three simple steps.
With the Conductor, you can:
- Build resilient, scalable, on-demand networks in minutes
- Provision, segment, revoke, and remediate resources 97% faster
- Ease the time burden on IT admins and reduce CapEx and OpEx by up to 50%
- Take the Conductor offline and network remains online. No traffic flows through it
FIPS add on available.
Whitepapers & Briefs
Simple Centralized Orchestration
IDN Orchestration Engine
HIP Cloud Connector: Bring Your Own Network to the Cloud
Connect and peer instances from any private or public cloud without constraints, such as peering between AWS and Azure for example. Now DevOps can create highly repeatable and programmatic templates to instantly build and tear down networks, and deploy separate segmented and automated environments for development, test, staging, and production.
HIPclient Automation: Instant & Elastic Private Workgroup Networks
Instantly create secure enclaves for workgroups where the resource is always cloaked and micro-segmented. Workgroup members can securely access information and data wherever they’re located, even across the world using public Wi-Fi.
API Integration with Other Network Services
Enable integration and automation with other security and networking services like directory services, SIEMs, monitoring tools, and others. Instant quarantine or failover (for example) can now be automated based on events detected by these systems, enabling you to build adaptive networks that can respond to events in real time.
Create Secure Network Overlays in Minutes
Building an Overlay Segment
Click to expand
Creating communication policy is point-and-click simple by adding the devices you want to include and building explicit trust relationships by clicking the radio buttons. This simple process replaces the multiple steps typically required for security and network configuration by IT staff.
The Conductor’s Visual Trust Map
Click to expand
Visual Trust Map
The Visual Trust Map allows you to immediately validate communication policy. This feature helps you with regulatory compliance reporting and security audits.
What are you waiting for?
For any additional questions, download the product brochure or give
us a call so we can prove just how simple, effective, and game-changing IDN is.