Cloaking is the new perimeter

11

Click here to load reader

Transcript of Cloaking is the new perimeter

Page 1: Cloaking is the new perimeter

Jeff S. Hussey

President & CEO

Page 2: Cloaking is the new perimeter

About Tempered Networks

• Provider of technology solutions for cyber security

• Established team of industry veterans lead by F5 founder

• Technology developed for F50; in production >10 years

• ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks

• Customers across commercial, industrial and public sectors

Page 3: Cloaking is the new perimeter

Keeping Up with Device Connectivity Today

OR

Easy PIVOT POINTS onto the network

• Geographically distributed

• IP enabled – vulnerable

• Run legacy or unpatchable software

Page 4: Cloaking is the new perimeter

Host Identity Protocol Revolution!

Built-in Security

• Cloaked and Unspoofable

• Seamless identity: No certs to manage!

• Solves vulnerabilities of TCP

TCP

inherently

insecure

HIP

Secure by

default

Page 5: Cloaking is the new perimeter

Automated Orchestration

Security Best Practice: Trusted Tempered Fabric

End-to-End Encryption Device-Based Whitelisting

Micro-Segmentation Automated Orchestration

Page 6: Cloaking is the new perimeter

Device-based

Whitelisting

Automated Orchestration

• Simplified, cleaner network architecture

• Plug-and-Play; No rip and replace

• Easy to use: Simple UI and no certs to manage

• Significantly lower TCO

Secure Identity-based Network Fabric

Page 7: Cloaking is the new perimeter

Automated Orchestration

• No advanced IT security skills required (low OpEx)

• Simplified network architecture (easy micro-segmentation)

• Enables enterprise scale and flexibility

• Lowest TCO over alternatives

The Cure to IT Complexity

Automated Orchestration

Page 8: Cloaking is the new perimeter

Headquarters

ATM / POS / Kiosks

IP-Cameras

Branch

Office(s)

Vendor Access

Research &

Development

High Availability

HIPswitches

Current TCP/IP Network

HIPswitch Appliances

Point-to-Point Encrypted Channels

Micro-segmented Private Overlay(s)ATM / POS / Kiosks

IP-Cameras

Branch

Office(s)

Vendor Access

Research &

Development

Virtual

HIPswitch

Rapid Deployment

1. Drop our HIPswitches in front of any

IP-connected device

2. Configure explicit trust relationships

between HIPswitches in minutes

3. Communication can only occur with

trusted peers that have been whitelisted

4. Single pane-of-glass management

5. The result: Cloaked endpoints and

micro-segmented networks

Tempered Networks Deployment Example

Conductor

Page 9: Cloaking is the new perimeter

Sample Use Cases

Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical)

Secure kiosks running unpatchable OS; distributed on untrusted infrastructure

Migrate away from MPLS/T1 lines

Replace costly communications with inexpensive broadband

Secure Remote Access

Easily add / revoke users (e.g vendors, staff, etc) access

Automated Disaster Recovery / Ad Hoc Networks

Swing traffic—on demand--to alternative sites

Page 10: Cloaking is the new perimeter

Trusted Tempered Networks Platform

• Cloaks fluid enterprise perimeter and endpoints

• Cuts OpEx: Simple UI abstracts complex IP address routing

• Automates through centralized orchestration

Device-Based Whitelisting Micro-Segmentation Automated OrchestrationEnd-to-End Encryption

Page 11: Cloaking is the new perimeter

Thank you

[email protected]