Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Cloaking is the new perimeter

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 11 Publicité

Cloaking is the new perimeter

Télécharger pour lire hors ligne

Tempered Networks’ CEO, Jeff Hussey, explains how enterprise organizations can rapidly provision secure identity-based overlay networks that enable you to:
• Cloak or remove the IP footprint of any device from the underlying network to minimize network attack surfaces; significantly reducing vulnerability to externally mounted attacks.
• Transform vulnerable IP-enabled devices—even those that cannot protect themselves--into hardened, invisible assets.
• Rapidly deploy any number of secure overlay networks through centralized orchestration of policies, which allow for easy micro-segmentation of any communications to trusted entities.

Tempered Networks’ CEO, Jeff Hussey, explains how enterprise organizations can rapidly provision secure identity-based overlay networks that enable you to:
• Cloak or remove the IP footprint of any device from the underlying network to minimize network attack surfaces; significantly reducing vulnerability to externally mounted attacks.
• Transform vulnerable IP-enabled devices—even those that cannot protect themselves--into hardened, invisible assets.
• Rapidly deploy any number of secure overlay networks through centralized orchestration of policies, which allow for easy micro-segmentation of any communications to trusted entities.

Publicité
Publicité

Plus De Contenu Connexe

Diaporamas pour vous (19)

Les utilisateurs ont également aimé (20)

Publicité

Similaire à Cloaking is the new perimeter (20)

Plus récents (20)

Publicité

Cloaking is the new perimeter

  1. 1. Jeff S. Hussey President & CEO
  2. 2. About Tempered Networks • Provider of technology solutions for cyber security • Established team of industry veterans lead by F5 founder • Technology developed for F50; in production >10 years • ‘Cloaks’ infrastructure and endpoints with identity-based overlay networks • Customers across commercial, industrial and public sectors
  3. 3. Keeping Up with Device Connectivity Today OR Easy PIVOT POINTS onto the network • Geographically distributed • IP enabled – vulnerable • Run legacy or unpatchable software
  4. 4. Host Identity Protocol Revolution! Built-in Security • Cloaked and Unspoofable • Seamless identity: No certs to manage! • Solves vulnerabilities of TCP TCP inherently insecure HIP Secure by default
  5. 5. Automated Orchestration Security Best Practice: Trusted Tempered Fabric End-to-End Encryption Device-Based Whitelisting Micro-Segmentation Automated Orchestration
  6. 6. Device-based Whitelisting Automated Orchestration • Simplified, cleaner network architecture • Plug-and-Play; No rip and replace • Easy to use: Simple UI and no certs to manage • Significantly lower TCO Secure Identity-based Network Fabric
  7. 7. Automated Orchestration • No advanced IT security skills required (low OpEx) • Simplified network architecture (easy micro-segmentation) • Enables enterprise scale and flexibility • Lowest TCO over alternatives The Cure to IT Complexity Automated Orchestration
  8. 8. Headquarters ATM / POS / Kiosks IP-Cameras Branch Office(s) Vendor Access Research & Development High Availability HIPswitches Current TCP/IP Network HIPswitch Appliances Point-to-Point Encrypted Channels Micro-segmented Private Overlay(s) ATM / POS / Kiosks IP-Cameras Branch Office(s) Vendor Access Research & Development Virtual HIPswitch Rapid Deployment 1. Drop our HIPswitches in front of any IP-connected device 2. Configure explicit trust relationships between HIPswitches in minutes 3. Communication can only occur with trusted peers that have been whitelisted 4. Single pane-of-glass management 5. The result: Cloaked endpoints and micro-segmented networks Tempered Networks Deployment Example Conductor
  9. 9. Sample Use Cases Cloak & Segment ‘Things’ (e.g. POS, ATMs, Vending, Medical) Secure kiosks running unpatchable OS; distributed on untrusted infrastructure Migrate away from MPLS/T1 lines Replace costly communications with inexpensive broadband Secure Remote Access Easily add / revoke users (e.g vendors, staff, etc) access Automated Disaster Recovery / Ad Hoc Networks Swing traffic—on demand--to alternative sites
  10. 10. Trusted Tempered Networks Platform • Cloaks fluid enterprise perimeter and endpoints • Cuts OpEx: Simple UI abstracts complex IP address routing • Automates through centralized orchestration Device-Based Whitelisting Micro-Segmentation Automated OrchestrationEnd-to-End Encryption
  11. 11. Thank you info@temperednetworks.com

Notes de l'éditeur

  • Easy PIVOT POINTS onto the network

    Geographically distributed

    IP enabled – vulnerable

    Run legacy or unpatchable software


  • HIP enables you to shift from IP based routing to a scalable and flexible network architecture based on cryptographic identities
  • Enables you to trust your network again

×