Tempered Glossary

Title Sort ascending

All HIP-enabled switches, clients, servers, etc. on all platforms, such as cloud, virtual, and physical.


A light weight software application installed on an individual server to enable HIPservices.


An identity-based router that networks and encrypts communication between any identified hosts or systems spanning separate networks from any location, across any connectivity medium.


A light weight software application installed on laptops or mobile devices to enable HIPservices. 

HIP (Host Identity Protocol)

An IETF (Internet Engineering Task Force) ratified standard, HIP delivers a secure mobile IP architecture, where authentication and authorization based on cryptographic identity takes place before transport (TCP) and data exchange can occur. 

End-to-end encryption

A method of secure communication that prevents third-parties from accessing data while it's transferred from one end system or device to another. 


A policy-based orchestration engine—with an intuitive point-n-click UI—that  allows organizations to easily handle large-scale deployments by automating the setup, implementation, and ongoing functioning of HIPservices. 


To render trusted devices invisible by only allowing communication when a machine is authenticated and authorized before a TCP session is established so they cannot be viewed, queried, or detected by anything outside a Tempered Networks’ secure overlay network. This occurs between a network’s Layer 2 to Layer 4 infrastructure and effectively makes the network invisible from all untrusted machines.