Tempered Networks’ CEO, Jeff Hussey, explains how enterprise organizations can rapidly provision secure identity-based overlay networks that enable you to:
• Cloak or remove the IP footprint of any device from the underlying network to minimize network attack surfaces; significantly reducing vulnerability to externally mounted attacks.
• Transform vulnerable IP-enabled devices—even those that cannot protect themselves--into hardened, invisible assets.
• Rapidly deploy any number of secure overlay networks through centralized orchestration of policies, which allow for easy micro-segmentation of any communications to trusted entities.
2. About Tempered Networks
• Provider of technology solutions for cyber security
• Established team of industry veterans lead by F5 founder
• Technology developed for F50; in production >10 years
• ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks
• Customers across commercial, industrial and public sectors
3. Keeping Up with Device Connectivity Today
OR
Easy PIVOT POINTS onto the network
• Geographically distributed
• IP enabled – vulnerable
• Run legacy or unpatchable software
4. Host Identity Protocol Revolution!
Built-in Security
• Cloaked and Unspoofable
• Seamless identity: No certs to manage!
• Solves vulnerabilities of TCP
TCP
inherently
insecure
HIP
Secure by
default
7. Automated Orchestration
• No advanced IT security skills required (low OpEx)
• Simplified network architecture (easy micro-segmentation)
• Enables enterprise scale and flexibility
• Lowest TCO over alternatives
The Cure to IT Complexity
Automated Orchestration
8. Headquarters
ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
High Availability
HIPswitches
Current TCP/IP Network
HIPswitch Appliances
Point-to-Point Encrypted Channels
Micro-segmented Private Overlay(s)
ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
Virtual
HIPswitch
Rapid Deployment
1. Drop our HIPswitches in front of any
IP-connected device
2. Configure explicit trust relationships
between HIPswitches in minutes
3. Communication can only occur with
trusted peers that have been whitelisted
4. Single pane-of-glass management
5. The result: Cloaked endpoints and
micro-segmented networks
Tempered Networks Deployment Example
Conductor
9. Sample Use Cases
Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical)
Secure kiosks running unpatchable OS; distributed on untrusted infrastructure
Migrate away from MPLS/T1 lines
Replace costly communications with inexpensive broadband
Secure Remote Access
Easily add / revoke users (e.g vendors, staff, etc) access
Automated Disaster Recovery / Ad Hoc Networks
Swing traffic—on demand--to alternative sites