SlideShare una empresa de Scribd logo
1 de 11
Jeff S. Hussey
President & CEO
About Tempered Networks
• Provider of technology solutions for cyber security
• Established team of industry veterans lead by F5 founder
• Technology developed for F50; in production >10 years
• ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks
• Customers across commercial, industrial and public sectors
Keeping Up with Device Connectivity Today
OR
Easy PIVOT POINTS onto the network
• Geographically distributed
• IP enabled – vulnerable
• Run legacy or unpatchable software
Host Identity Protocol Revolution!
Built-in Security
• Cloaked and Unspoofable
• Seamless identity: No certs to manage!
• Solves vulnerabilities of TCP
TCP
inherently
insecure
HIP
Secure by
default
Automated Orchestration
Security Best Practice: Trusted Tempered Fabric
End-to-End Encryption Device-Based Whitelisting
Micro-Segmentation Automated Orchestration
Device-based
Whitelisting
Automated Orchestration
• Simplified, cleaner network architecture
• Plug-and-Play; No rip and replace
• Easy to use: Simple UI and no certs to manage
• Significantly lower TCO
Secure Identity-based Network Fabric
Automated Orchestration
• No advanced IT security skills required (low OpEx)
• Simplified network architecture (easy micro-segmentation)
• Enables enterprise scale and flexibility
• Lowest TCO over alternatives
The Cure to IT Complexity
Automated Orchestration
Headquarters
ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
High Availability
HIPswitches
Current TCP/IP Network
HIPswitch Appliances
Point-to-Point Encrypted Channels
Micro-segmented Private Overlay(s)
ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
Virtual
HIPswitch
Rapid Deployment
1. Drop our HIPswitches in front of any
IP-connected device
2. Configure explicit trust relationships
between HIPswitches in minutes
3. Communication can only occur with
trusted peers that have been whitelisted
4. Single pane-of-glass management
5. The result: Cloaked endpoints and
micro-segmented networks
Tempered Networks Deployment Example
Conductor
Sample Use Cases
Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical)
Secure kiosks running unpatchable OS; distributed on untrusted infrastructure
Migrate away from MPLS/T1 lines
Replace costly communications with inexpensive broadband
Secure Remote Access
Easily add / revoke users (e.g vendors, staff, etc) access
Automated Disaster Recovery / Ad Hoc Networks
Swing traffic—on demand--to alternative sites
Trusted Tempered Networks Platform
• Cloaks fluid enterprise perimeter and endpoints
• Cuts OpEx: Simple UI abstracts complex IP address routing
• Automates through centralized orchestration
Device-Based Whitelisting Micro-Segmentation Automated OrchestrationEnd-to-End Encryption
Thank you
info@temperednetworks.com

Más contenido relacionado

La actualidad más candente

Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleSACHIN SHARMA
 
Innovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHThibault Cantegrel
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
Innovation Summit 2015 - 3 - WP
Innovation Summit 2015 - 3 - WPInnovation Summit 2015 - 3 - WP
Innovation Summit 2015 - 3 - WPThibault Cantegrel
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink AndreAndrzejSzadzins
 
Security Capabilities of IPAM
Security Capabilities of IPAMSecurity Capabilities of IPAM
Security Capabilities of IPAMAndreas Taudte
 
Innovation Summit 2015 - 7 - IoT Future
Innovation Summit 2015 - 7 - IoT FutureInnovation Summit 2015 - 7 - IoT Future
Innovation Summit 2015 - 7 - IoT FutureThibault Cantegrel
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageThibault Cantegrel
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT OutsourcingMultiTech IT
 
IoT Platform Meetup - IBM
IoT Platform Meetup - IBMIoT Platform Meetup - IBM
IoT Platform Meetup - IBMFilip Kolář
 
Epoch Universal Solution: Wireless Offerings
Epoch Universal Solution: Wireless OfferingsEpoch Universal Solution: Wireless Offerings
Epoch Universal Solution: Wireless OfferingsEpoch Universal, Inc.
 
Ignition Edge: Simplifying the Edge of the Network
 Ignition Edge: Simplifying the Edge of the Network Ignition Edge: Simplifying the Edge of the Network
Ignition Edge: Simplifying the Edge of the NetworkInductive Automation
 

La actualidad más candente (19)

Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
Innovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOH
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
Innovation Summit 2015 - 3 - WP
Innovation Summit 2015 - 3 - WPInnovation Summit 2015 - 3 - WP
Innovation Summit 2015 - 3 - WP
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink
 
Physically securing the wireless installation
Physically securing the wireless installationPhysically securing the wireless installation
Physically securing the wireless installation
 
Security Capabilities of IPAM
Security Capabilities of IPAMSecurity Capabilities of IPAM
Security Capabilities of IPAM
 
Innovation Summit 2015 - 7 - IoT Future
Innovation Summit 2015 - 7 - IoT FutureInnovation Summit 2015 - 7 - IoT Future
Innovation Summit 2015 - 7 - IoT Future
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
IoT Platform Meetup - IBM
IoT Platform Meetup - IBMIoT Platform Meetup - IBM
IoT Platform Meetup - IBM
 
Epoch Universal Solution: Wireless Offerings
Epoch Universal Solution: Wireless OfferingsEpoch Universal Solution: Wireless Offerings
Epoch Universal Solution: Wireless Offerings
 
Ignition Edge: Simplifying the Edge of the Network
 Ignition Edge: Simplifying the Edge of the Network Ignition Edge: Simplifying the Edge of the Network
Ignition Edge: Simplifying the Edge of the Network
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Lab introduction
Lab introductionLab introduction
Lab introduction
 

Similar a Cloaking is the new perimeter

From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedTempered
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2thidisbogus
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summitkimw001
 
6 Simple Steps to Enterprise Digital Transformation
6 Simple Steps to Enterprise Digital Transformation6 Simple Steps to Enterprise Digital Transformation
6 Simple Steps to Enterprise Digital TransformationInductive Automation
 
Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Jesse van Doren
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewayEurotech
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseAlok Vasudeva
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfssuser8b324e
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 

Similar a Cloaking is the new perimeter (20)

From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Smart Networks for the Industrial Internet of Things
Smart Networks for the Industrial Internet of ThingsSmart Networks for the Industrial Internet of Things
Smart Networks for the Industrial Internet of Things
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
6 Simple Steps to Enterprise Digital Transformation
6 Simple Steps to Enterprise Digital Transformation6 Simple Steps to Enterprise Digital Transformation
6 Simple Steps to Enterprise Digital Transformation
 
Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Presentatie Alcom - Meetup
Presentatie Alcom - Meetup
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent Gateway
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the Enterprise
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Cloaking is the new perimeter

  • 2. About Tempered Networks • Provider of technology solutions for cyber security • Established team of industry veterans lead by F5 founder • Technology developed for F50; in production >10 years • ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks • Customers across commercial, industrial and public sectors
  • 3. Keeping Up with Device Connectivity Today OR Easy PIVOT POINTS onto the network • Geographically distributed • IP enabled – vulnerable • Run legacy or unpatchable software
  • 4. Host Identity Protocol Revolution! Built-in Security • Cloaked and Unspoofable • Seamless identity: No certs to manage! • Solves vulnerabilities of TCP TCP inherently insecure HIP Secure by default
  • 5. Automated Orchestration Security Best Practice: Trusted Tempered Fabric End-to-End Encryption Device-Based Whitelisting Micro-Segmentation Automated Orchestration
  • 6. Device-based Whitelisting Automated Orchestration • Simplified, cleaner network architecture • Plug-and-Play; No rip and replace • Easy to use: Simple UI and no certs to manage • Significantly lower TCO Secure Identity-based Network Fabric
  • 7. Automated Orchestration • No advanced IT security skills required (low OpEx) • Simplified network architecture (easy micro-segmentation) • Enables enterprise scale and flexibility • Lowest TCO over alternatives The Cure to IT Complexity Automated Orchestration
  • 8. Headquarters ATM / POS / Kiosks IP-Cameras Branch Office(s) Vendor Access Research & Development High Availability HIPswitches Current TCP/IP Network HIPswitch Appliances Point-to-Point Encrypted Channels Micro-segmented Private Overlay(s) ATM / POS / Kiosks IP-Cameras Branch Office(s) Vendor Access Research & Development Virtual HIPswitch Rapid Deployment 1. Drop our HIPswitches in front of any IP-connected device 2. Configure explicit trust relationships between HIPswitches in minutes 3. Communication can only occur with trusted peers that have been whitelisted 4. Single pane-of-glass management 5. The result: Cloaked endpoints and micro-segmented networks Tempered Networks Deployment Example Conductor
  • 9. Sample Use Cases Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical) Secure kiosks running unpatchable OS; distributed on untrusted infrastructure Migrate away from MPLS/T1 lines Replace costly communications with inexpensive broadband Secure Remote Access Easily add / revoke users (e.g vendors, staff, etc) access Automated Disaster Recovery / Ad Hoc Networks Swing traffic—on demand--to alternative sites
  • 10. Trusted Tempered Networks Platform • Cloaks fluid enterprise perimeter and endpoints • Cuts OpEx: Simple UI abstracts complex IP address routing • Automates through centralized orchestration Device-Based Whitelisting Micro-Segmentation Automated OrchestrationEnd-to-End Encryption

Notas del editor

  1. Easy PIVOT POINTS onto the network Geographically distributed IP enabled – vulnerable Run legacy or unpatchable software
  2. HIP enables you to shift from IP based routing to a scalable and flexible network architecture based on cryptographic identities
  3. Enables you to trust your network again