tempered networks product line - mcnaughton-mckay€¦ · host identity protocol (hip) - a game...

4
SECURE CONNECTIVITY FOR BUSINESS CRITICAL INFRASTRUCTURE & INFORMATION Named Tempered Networks “a 2015 Security Innovator”

Upload: others

Post on 30-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tempered Networks Product Line - McNaughton-McKay€¦ · Host Identity Protocol (HIP) - A Game Changer in IP Communications Recognized by the Internet Engineering Task Force (IETF)

Take control of your business critical infrastructure with Tempered Networks’ proven solution for keeping industrial, commercial, and public sector assets secure and resilient.

To learn more, email [email protected], call 206.452.5500, or visit temperednetworks.com.

HIPswitch100 Series

HIPswitch200 Series

HIPswitch400 Series

Virtual HIPswitch

HIPswitch300 Series

“Recognized by the Internet Engineering Task Force (IETF) community as the next possible big change in IP architecture, HIP was first deployed within the defense and aerospace industry as a cost-efficient and scalable solution to address growing threat environments.”

Dr. Andrei Gurtov,Principal Scientist at the Helsinki Institute for InformationTechnology HIIT, and a senior member of IEEE and ACM

Tempered Networks Product Line

SECURE CONNECTIVITY FOR BUSINESS CRITICAL INFRASTRUCTURE & INFORMATION

HIPswitch Appliances

Multiple functionality within a single appliance to provide cost-effective and secure connectivity.

Secure cellular communications: An integrated cellular modem provides secure cellular connectivity for distributed infrastructure, regardless of geographical location. Works across 2G/3G/4G/LTE networks and a variety of carriers including Verizon, AT&T, T-Mobile, Telus, Rogers, and others, with automatic failover between wired and cellular to ensure operational availability.

Encryption: End-to-end AES-256 encryption.

Serial-to-IP: HIPswitches support serial-to-IP encapsulation.

MAC address lockdown: Enhance your security posture by blocking traffic from untrusted (non-whitelisted) devices.

HIPswitch Conductor

Centralized management of security policies, explicit trust relationships, and monitoring/analytics of your secure trusted overlays is easy through our advanced orchestration engine, with a drag-n-drop UI. Access can be delegated to different users, while the governance of the entire solution is centralized and retained by the administrator.

Named Tempered Networks “a 2015 Security Innovator”

Page 2: Tempered Networks Product Line - McNaughton-McKay€¦ · Host Identity Protocol (HIP) - A Game Changer in IP Communications Recognized by the Internet Engineering Task Force (IETF)

The Opportunity

The Solution - Defining a New Approach to Security & Network Efficiency

Tempered Networks Solution

Leveraging HIP, Tempered Networks offers a fundamentally new approach to cyber security that can immediately help organizations improve their security posture and simplify their networks. We provide the operational efficiencies required to protect enterprise infrastructure in today’s complex environment, while enabling a highly flexible network architecture.

Through the power of centralized orchestration of trusted overlay networks, you achieve unprecedented efficiencies and easy micro-segmentation—down to the device level. Our breakthrough security platform is purpose-built to eliminate the complexities and overcome the human error associated with current security products. It allows for massive scalability and can be managed by staff without advanced IT skills.

The next generation of computing--fueled by machine-to-machine communications and the industrial Internet of Things (IIoT)—is creating potential greenfield opportunities for enterprises, across all industries. Organizations have the potential to create new business models, streamline operations and better leverage Big Data analytics through increased inter-connectivity.

By 2020, over 28 billion ‘things’ will be connected to the Internet, according to an MIT Technology Review business report. Organizations that can effectively harness the convergence of connected devices and systems in a secure, manageable way—at enterprise scale—will be the winners.

The Challenge - The Expanding Attack SurfaceAs organizations connect a growing variety of systems and devices—including endpoints that were never intended to be networked--the complexity of their infrastructure increases. Correspondingly, the network attack surface expands, making enterprises even more vulnerable to cyber security breaches. With IT network and security staff already over-stretched, deploying and maintaining this complex environment is not only extremely costly, but also creates more opportunities for manual errors that jeopardize your network.

1. Drop our HIPswitches in front of any IP-connected device(s)2. Configure explicit trust relationships between HIPswitches in minutes 3. Communication can only occur with other whitelisted (trusted) HIPswitches 4. The result: Cloaked endpoints and micro-segmented networks

Headquarters

Device A HIPswitchEncrypted Bridge

HIPswitch Device B

Tempered Trusted Overlay Network

Shared IP Network (untrusted)

Encrypted Overlay Networks: Micro-Segmented & Cloaked

ATM / POS / KiosksBranch Office(s)

Research & Development

Current TCP/IP Network

HIPswitch Appliances

Point-to-Point Encrypted Channels

Micro-segmentedOverlay Network(s)

IP-Cameras

VirtualHIPswitch

Vendor Access

High AvailabilityHipswitches

Rapid Deployment

Host Identity Protocol (HIP) - A Game Changer in IP Communications

Recognized by the Internet Engineering Task Force (IETF) community as the next possible big change in IP architecture, HIP is a standard-track network security protocol, approved by IETF in 2015.

HIP was first deployed within the defense and aerospace industry as a cost-efficient and scalable solution to address growing threat environments. The technology has been in use for over 10 years at a fortune 50 company, and recently commercialized for the broader market.

Tempered Networks’ next generation security platform stops breaches before they happen through its innovative ‘cloaking’ capability, using identity-based overlay networks that drop into your existing network. Our solution safeguards your business critical assets, communications and vulnerable endpoints, enabling them to securely connect over shared infrastructure.

Centralized orchestration of trusted overlay networks offers unprecedented scalability— securing thousands of endpoints is as fast as securing ten, significantly reducing operational costs.

End-to-End Encryption √ Embedded PKI √ AES 256

Automated Orchestration √ Centralized management of trust relationships and policies √ Create unlimited secure overlay networks

Identity-Based Overlay Networks

Micro-Segmentation √ Isolated secure overlay networks √ Cloaking technology removes devices off IP Networks

Device-Based Whitelisting √ Create policies based on a whitelist

End-to-end communications for whitelisted devices are protected using AES-256 encryption and SHA-2 message authentication.

Page 3: Tempered Networks Product Line - McNaughton-McKay€¦ · Host Identity Protocol (HIP) - A Game Changer in IP Communications Recognized by the Internet Engineering Task Force (IETF)

The Opportunity

The Solution - Defining a New Approach to Security & Network Efficiency

Tempered Networks Solution

Leveraging HIP, Tempered Networks offers a fundamentally new approach to cyber security that can immediately help organizations improve their security posture and simplify their networks. We provide the operational efficiencies required to protect enterprise infrastructure in today’s complex environment, while enabling a highly flexible network architecture.

Through the power of centralized orchestration of trusted overlay networks, you achieve unprecedented efficiencies and easy micro-segmentation—down to the device level. Our breakthrough security platform is purpose-built to eliminate the complexities and overcome the human error associated with current security products. It allows for massive scalability and can be managed by staff without advanced IT skills.

The next generation of computing--fueled by machine-to-machine communications and the industrial Internet of Things (IIoT)—is creating potential greenfield opportunities for enterprises, across all industries. Organizations have the potential to create new business models, streamline operations and better leverage Big Data analytics through increased inter-connectivity.

By 2020, over 28 billion ‘things’ will be connected to the Internet, according to an MIT Technology Review business report. Organizations that can effectively harness the convergence of connected devices and systems in a secure, manageable way—at enterprise scale—will be the winners.

The Challenge - The Expanding Attack SurfaceAs organizations connect a growing variety of systems and devices—including endpoints that were never intended to be networked--the complexity of their infrastructure increases. Correspondingly, the network attack surface expands, making enterprises even more vulnerable to cyber security breaches. With IT network and security staff already over-stretched, deploying and maintaining this complex environment is not only extremely costly, but also creates more opportunities for manual errors that jeopardize your network.

1. Drop our HIPswitches in front of any IP-connected device(s)2. Configure explicit trust relationships between HIPswitches in minutes 3. Communication can only occur with other whitelisted (trusted) HIPswitches 4. The result: Cloaked endpoints and micro-segmented networks

Headquarters

Device A HIPswitchEncrypted Bridge

HIPswitch Device B

Tempered Trusted Overlay Network

Shared IP Network (untrusted)

Encrypted Overlay Networks: Micro-Segmented & Cloaked

ATM / POS / KiosksBranch Office(s)

Research & Development

Current TCP/IP Network

HIPswitch Appliances

Point-to-Point Encrypted Channels

Micro-segmentedOverlay Network(s)

IP-Cameras

VirtualHIPswitch

Vendor Access

High AvailabilityHipswitches

Rapid Deployment

Host Identity Protocol (HIP) - A Game Changer in IP Communications

Recognized by the Internet Engineering Task Force (IETF) community as the next possible big change in IP architecture, HIP is a standard-track network security protocol, approved by IETF in 2015.

HIP was first deployed within the defense and aerospace industry as a cost-efficient and scalable solution to address growing threat environments. The technology has been in use for over 10 years at a fortune 50 company, and recently commercialized for the broader market.

Tempered Networks’ next generation security platform stops breaches before they happen through its innovative ‘cloaking’ capability, using identity-based overlay networks that drop into your existing network. Our solution safeguards your business critical assets, communications and vulnerable endpoints, enabling them to securely connect over shared infrastructure.

Centralized orchestration of trusted overlay networks offers unprecedented scalability— securing thousands of endpoints is as fast as securing ten, significantly reducing operational costs.

End-to-End Encryption √ Embedded PKI √ AES 256

Automated Orchestration √ Centralized management of trust relationships and policies √ Create unlimited secure overlay networks

Identity-Based Overlay Networks

Micro-Segmentation √ Isolated secure overlay networks √ Cloaking technology removes devices off IP Networks

Device-Based Whitelisting √ Create policies based on a whitelist

End-to-end communications for whitelisted devices are protected using AES-256 encryption and SHA-2 message authentication.

Page 4: Tempered Networks Product Line - McNaughton-McKay€¦ · Host Identity Protocol (HIP) - A Game Changer in IP Communications Recognized by the Internet Engineering Task Force (IETF)

Take control of your business critical infrastructure with Tempered Networks’ proven solution for keeping industrial, commercial, and public sector assets secure and resilient.

To learn more, email [email protected], call 206.452.5500, or visit temperednetworks.com.

HIPswitch100 Series

HIPswitch200 Series

HIPswitch400 Series

Virtual HIPswitch

HIPswitch300 Series

“Recognized by the Internet Engineering Task Force (IETF) community as the next possible big change in IP architecture, HIP was first deployed within the defense and aerospace industry as a cost-efficient and scalable solution to address growing threat environments.”

Dr. Andrei Gurtov,Principal Scientist at the Helsinki Institute for InformationTechnology HIIT, and a senior member of IEEE and ACM

Tempered Networks Product Line

SECURE CONNECTIVITY FOR BUSINESS CRITICAL INFRASTRUCTURE & INFORMATION

HIPswitch Appliances

Multiple functionality within a single appliance to provide cost-effective and secure connectivity.

Secure cellular communications: An integrated cellular modem provides secure cellular connectivity for distributed infrastructure, regardless of geographical location. Works across 2G/3G/4G/LTE networks and a variety of carriers including Verizon, AT&T, T-Mobile, Telus, Rogers, and others, with automatic failover between wired and cellular to ensure operational availability.

Encryption: End-to-end AES-256 encryption.

Serial-to-IP: HIPswitches support serial-to-IP encapsulation.

MAC address lockdown: Enhance your security posture by blocking traffic from untrusted (non-whitelisted) devices.

HIPswitch Conductor

Centralized management of security policies, explicit trust relationships, and monitoring/analytics of your secure trusted overlays is easy through our advanced orchestration engine, with a drag-n-drop UI. Access can be delegated to different users, while the governance of the entire solution is centralized and retained by the administrator.

Named Tempered Networks “a 2015 Security Innovator”