Whitepapers & Briefs

Identity-Based Routing Makes Micro-Segmentation Simple and Unbreakable

IDN creates a wide area network overlay that can directly connect any privately addressed endpoints on separate networks.
5 Common Micro-Segmentation Mistakes and How to Avoid Them

Our guide outlines and helps you avoid the most common mistakes organizations made during their failed micro-segmentation projects. Read it and start your project off right!
ESG Lab Review

ESG Lab report documents their hands-on testing of IDN use cases and validation of our ‘identity-first’ approach for secure networking.


 

SANS ICS Survey

Get informed with actionable intelligence on critical control systems that help drive, monitor, and process our vital global resources. Read the 2017 SANS ICS Security survey.

Controller-Pilot Data Link Communication Security

With increased utilization of new types of cockpit communications, airplanes are at higher risk of hacking or interference than ever before. This paper discusses the applicability of the Host Identity Protocol (HIP) as a possible countermeasure to the identified security threats.
Networking 3.0 Whitepaper

With a modern networking architecture based on cryptographic identities, organizations now have a flexible and secure architecture where only provably cryptographically identifiable devices are connected.

 

Technical Whitepaper

A deeper technical dive of the IDN architecture - the world's first solution that enables connectivity for any device, anywhere in the world, even across separate layer 2 and layer 3 networks.
Primer on Host Identity Protocol

How HIP evolves the traditional IP networking paradigm. By Dr. Andrei Gurtov, Principal Scientist at the Helsinki Institute for Information Technology HIIT, and a senior member of IEEE and ACM.
IDN Solution Brochure

A quick overview on the value of IDN. Our IDN fabric lets you dynamically connect anything, anywhere – even private and non-routable resources – across physical, virtual, cloud or cellular networks.

 

Compliance

PCI DSS Compliance

Tempered Networks Identity-Defined Networking (IDN) platform compliance with PCI DSS V3.2. Product applicability guide to assist in supporting payment card industry data security standard v3.2 compliance
NIST Cybersecurity Framework

With Tempered Networks, you can align with the CSF Core and achieve secure connectivity and segmentation at scale for any device, anywhere in the world, across any network environment.
NERC-CIP Compliance

IDN doesn't just facilitate compliance; it delivers real and demonstrated security hardening, resilience, and network elasticity, helping your organizations meet NERC-CIP standards.

 

NIST Manufacturing Profile

The CSF “Manufacturing Profile” can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices.