About Tempered Networks
Tempered Networks is the pioneer of Identity-Defined Networking, delivering a fabric-based architecture that unifies networking and security and enables mobility. Our technology has been in production for over 10 years in the aerospace and defense industry and recently commercialized for the broader market. Today, our proven technology and ‘well-tempered networks’ have been successfully deployed for customers around the world, including Fortune 500 companies.
As enterprise organizations take on the challenge of digital transformation–embracing cloud, mobility, data analytics, and social business–there are considerable architectural, operational, and security implications for network infrastructure. Today, most enterprise IT staff face scalability limits of humans and hardware, which not only hinders business agility, but also lowers the organization’s security posture. It goes without saying that the network is the business, especially today with virtually every ‘thing’ requiring network connectivity—including things that were never intended to be networked (e.g. IoT). IT is under increasing pressure to support the demands of the business, while safeguarding vital information and assets from cyber threats. Doing more of the same, using traditional IT solutions, is a losing battle. A new approach is required that removes the manual, error-prone challenges of IP management, so IT can focus on moving the business forward.
Tempered Networks Identity-Defined Network (IDN) Fabric transcends the restrictive and complex rules of IP networking through the use of the Host Identity Protocol (HIP), to address the fundamental issues of TCP/IP. TCP/IP was built for connectivity, not security, and is spoofable. To remedy this issue, HIP replaces IP addresses with unspoofable cryptographic identities (CIDs). By using the Conductor, administrators can rapidly assign CIDs to endpoints, machines and networks, and centrally manage them across the fabric.
The IDN architecture incorporates a fully encrypted fabric that is orchestrated through an intuitive, visually-driven management and orchestration engine. Unlike traditional IP networking and SDN approaches, Tempered Networks’ solution requires few if any changes to the underlying network, significantly reducing complexity and cost, and increasing organizational responsiveness.
Tempered Networks’ IDN design objective is based on the principle that it must be simple to connect, disconnect, segment, move, fail-over or revoke resources and networks instantly. The result is an approach that can enable self-service by business units, yet satisfy corporate IT’s requirement to control and verify policy enforcement.
The flexibility of the IDN allows for securely networking local and remote resources to services, regardless of where a device, host or network is located; regardless of whether the resource is managed by someone in corporate offices or by a third party. Because IDN security policy is based on a unique, long lived CryptoID (CID), rather than on a short-lived IP addresses, whose ephemeral nature is constrained within classic IT infrastructure, the IDN can deliver secured on-demand network management anywhere, any time. De-coupling the identifier and locator functions of an IP address restores its original purpose as a resource locator, and using a CryptoID is what makes the unified secure IDN approach not only resilient but practical. Unlike SDN technologies, networking and security policy orchestration is made so simple that authorized business teams can easily make their own policy changes without involving other teams or risk exposing corporate networks and connected resources.
As a result, organizations now have a common unified architecture that significantly reduces attack vectors and configuration errors. Customers can significantly improve network efficiency in a variety of ways. Provisioning is simplified. Fail-over is faster, predictable, and easily verifiable. Dependency on complex firewall rules, VPN policies and keys, ACLs, and VLAN is greatly reduced. Managing a simple IP address change, migration, addition of a new network, office or kiosk, or providing temporary and controlled third party access no longer requires significant time and expertise. Traditional network management complexity need no longer constrain an organization’s ability to quickly adapt.Independent Software Vendor (ISV)Network Equipment Manufacturer (NEM)
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.