|Title Sort descending|
To render trusted devices invisible by only allowing communication when a machine is authenticated and authorized before a TCP session is established so they cannot be viewed, queried, or detected by anything outside a Tempered Networks’ secure overlay network. This occurs between a network’s Layer 2 to Layer 4 infrastructure and effectively makes the network invisible from all untrusted machines.
A policy-based orchestration engine—with an intuitive point-n-click UI—that allows organizations to easily handle large-scale deployments by automating the setup, implementation, and ongoing functioning of HIPservices.
A method of secure communication that prevents third-parties from accessing data while it's transferred from one end system or device to another.
|HIP (Host Identity Protocol)||
An IETF (Internet Engineering Task Force) ratified standard, HIP delivers a secure mobile IP architecture, where authentication and authorization based on cryptographic identity takes place before transport (TCP) and data exchange can occur.
A light weight software application installed on laptops or mobile devices to enable HIPservices.
An identity-based router that networks and encrypts communication between any identified hosts or systems spanning separate networks from any location, across any connectivity medium.
A light weight software application installed on an individual server to enable HIPservices.
All HIP-enabled switches, clients, servers, etc. on all platforms, such as cloud, virtual, and physical.
A physical or virtual appliance that bridges or routes traffic between private networks and identity-defined overlay networks.
|Host Identity Namespace (HIN)||
HIP introduces a more secure and flexible namespace, the Host Identity Namespace, which enables the ability to set explicit whitelist trust policies and achieve IP mobility without disruption. HIN is compatible with the IP and DNS Namespaces.