Cloaking is the new perimeter
Click here to load reader
-
Upload
tempered -
Category
Technology
-
view
53 -
download
1
Transcript of Cloaking is the new perimeter
Jeff S. Hussey
President & CEO
About Tempered Networks
• Provider of technology solutions for cyber security
• Established team of industry veterans lead by F5 founder
• Technology developed for F50; in production >10 years
• ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks
• Customers across commercial, industrial and public sectors
Keeping Up with Device Connectivity Today
OR
Easy PIVOT POINTS onto the network
• Geographically distributed
• IP enabled – vulnerable
• Run legacy or unpatchable software
Host Identity Protocol Revolution!
Built-in Security
• Cloaked and Unspoofable
• Seamless identity: No certs to manage!
• Solves vulnerabilities of TCP
TCP
inherently
insecure
HIP
Secure by
default
Automated Orchestration
Security Best Practice: Trusted Tempered Fabric
End-to-End Encryption Device-Based Whitelisting
Micro-Segmentation Automated Orchestration
Device-based
Whitelisting
Automated Orchestration
• Simplified, cleaner network architecture
• Plug-and-Play; No rip and replace
• Easy to use: Simple UI and no certs to manage
• Significantly lower TCO
Secure Identity-based Network Fabric
Automated Orchestration
• No advanced IT security skills required (low OpEx)
• Simplified network architecture (easy micro-segmentation)
• Enables enterprise scale and flexibility
• Lowest TCO over alternatives
The Cure to IT Complexity
Automated Orchestration
Headquarters
ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
High Availability
HIPswitches
Current TCP/IP Network
HIPswitch Appliances
Point-to-Point Encrypted Channels
Micro-segmented Private Overlay(s)ATM / POS / Kiosks
IP-Cameras
Branch
Office(s)
Vendor Access
Research &
Development
Virtual
HIPswitch
Rapid Deployment
1. Drop our HIPswitches in front of any
IP-connected device
2. Configure explicit trust relationships
between HIPswitches in minutes
3. Communication can only occur with
trusted peers that have been whitelisted
4. Single pane-of-glass management
5. The result: Cloaked endpoints and
micro-segmented networks
Tempered Networks Deployment Example
Conductor
Sample Use Cases
Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical)
Secure kiosks running unpatchable OS; distributed on untrusted infrastructure
Migrate away from MPLS/T1 lines
Replace costly communications with inexpensive broadband
Secure Remote Access
Easily add / revoke users (e.g vendors, staff, etc) access
Automated Disaster Recovery / Ad Hoc Networks
Swing traffic—on demand--to alternative sites
Trusted Tempered Networks Platform
• Cloaks fluid enterprise perimeter and endpoints
• Cuts OpEx: Simple UI abstracts complex IP address routing
• Automates through centralized orchestration
Device-Based Whitelisting Micro-Segmentation Automated OrchestrationEnd-to-End Encryption
Thank you