|Title Sort ascending|
All HIP-enabled switches, clients, servers, etc. on all platforms, such as cloud, virtual, and physical.
A light weight software application installed on an individual server to enable HIPservices.
An identity-based router that networks and encrypts communication between any identified hosts or systems spanning separate networks from any location, across any connectivity medium.
A light weight software application installed on laptops or mobile devices to enable HIPservices.
|HIP (Host Identity Protocol)||
An IETF (Internet Engineering Task Force) ratified standard, HIP delivers a secure mobile IP architecture, where authentication and authorization based on cryptographic identity takes place before transport (TCP) and data exchange can occur.
A method of secure communication that prevents third-parties from accessing data while it's transferred from one end system or device to another.
A policy-based orchestration engine—with an intuitive point-n-click UI—that allows organizations to easily handle large-scale deployments by automating the setup, implementation, and ongoing functioning of HIPservices.
To render trusted devices invisible by only allowing communication when a machine is authenticated and authorized before a TCP session is established so they cannot be viewed, queried, or detected by anything outside a Tempered Networks’ secure overlay network. This occurs between a network’s Layer 2 to Layer 4 infrastructure and effectively makes the network invisible from all untrusted machines.