Digital transformation – the movement towards cloud, mobility, and big data analytics has architectural, operational, and security implications for network infrastructure. The result is inflexible and complex networks with a continuously expanding total attack surface that is close to impossible to manage and puts organizations at risk. The main cause stems from a fundamental flaw in the basic framework of IP networking.
Our technology leverages Host Identity Protocol which separates the role of an IP address as both host identity and location, to deliver the first commercially available solution – Identity Defined Networking (IDN). IDN lets us evolve beyond traditional IP networking to a trusted networking architecture based on cryptographic identities. It assigns a cryptographic identity to every IP-enabled device, and enables easy orchestration of these identities across physical, virtual, and cloud domains, creating a unified networking and security fabric.
The IDN design objective is based on the principle that it must be easy to connect, cloak, segment, move, failover, and disconnect networks and individual resources. It unifies networking and security into a single platform, making it simple to create Zero Trust Overlays without having to modify existing network or security infrastructure. Our point-and-click management console makes it easy to connect, micro-segment and manage all your networked devices—across any transport or location. And this approach comes at a fraction of the cost of alternative solutions.
Decrease in IT CapEx and OpEx
Decrease in network and resource provisioning time
Increase in networking and security team productivity
Reduction in overall network attack surface
Improvement in mitigation, revocation, and quarantine time
Number of seconds needed for failover and disaster recovery
Tempered Networks gave us a simple way to achieve end-to-end private networking for our Building Automation network that’s resilient, scalable, and secure. In less than 20 minutes, we were able to deploy our first cloaked overlay network without having to modify systems or involve IT.
Tom Walker, Facility Automation Services, Penn State University
Tempered Networks bridges the networking, SDN, and security technology markets with its Identity Defined Networking (IDN). IDN positively identifies and secures hosts and network devices as they attach to the network, reducing the ability of attackers to exploit a host.
Enterprise IT departments should evaluate Tempered Networks because it offers much more than security, such as built in routing, load balancing, and multi-pathing for workloads and devices on-premises, in the cloud, or in remote locations.
Mike Fratto, Research Director, GlobalData
The IDN solution should pay big dividends for organizations looking to simplify cloud networking. Doing something such as peering Amazon Web Services (AWS) and Microsoft Azure at the network edge is not easy and requires hundreds of configuration steps to resolve IP addressing conflicts and peering challenges. Because HIP uses identity for network connectivity, cloud instances can be directly connected to other instances that can traverse the AWS or Azure edges.
Zeus Kerravala, Principal Analyst, ZK Research
IDN might well be the most promising forward step for industrial cybersecurity since the invention of the firewall.
Harry Forbes, Research Director of Automation, ARC Advisory Group