Identity-Defined Networking (IDN) Products
The Components of an IDN Fabric
Our software is designed to run nearly anywhere on almost any type of device, virtual machine, or cloud instance – only three components are needed to quickly deploy your own IDN fabric across any network.
IDN Orchestration: The Conductor
IDN Enforcement Points: HIP Services
IDN Routing: The HIPrelay
The Conductor – IDN Orchestration
In an identity-first architecture, all trusted cryptographic identities are centrally managed across the fully encrypted fabric through the Conductor, a powerful orchestration engine with a simple point-and-click user interface (UI). The Conductor was designed to be extremely easy to use, even for staff without advanced technical training, which solves the challenge of security and networking complexity that makes scaling your business and network infrastructure costly and time-consuming.
HIP Services – IDN Enforcement Points
HIP Services are the enforcement points of Conductor-authored network and security policies, delivered in different form factors to support our vision of secure connectivity for any device. Available as hardware appliances, virtual deployments, cloud instances, clients/server software, or embedded in your own technology – HIP Services micro-segment, encrypt, route, and cloak all managed IP resources across an IDN deployment.
Get the flexibility you need to connect and protect endpoints in any environment – from IoT devices in far-flung remote locations to servers in your datacenter. Our physical appliances have built-in Ethernet, Wi-Fi, cellular (2g, 3g, 4g LTE modems), as well as Serial-over-IP functionality, delivering the most flexible link connectivity options found in the industry. HIP Services can effectively function as a router and/or bridge, replacing or reducing the need to deploy and maintain VPNs, internal firewalls, VLANs, ACLs, cellular modems, and access points in an attempt to accomplish secure connectivity, access, availability, and micro-segmentation. This delivers significant CapEx and OpEx savings, while providing a level of secure connectivity and flexibility previously beyond reach for organizations.
Cloud & Virtual Appliances
Most organizations struggle with connecting separate cloud infrastructures, and maintaining different VPNs for individual VPCs. In some cases, secure connectivity between cloud providers is either impossible, or requires up to 150 individual configuration steps to peer between clouds. In fact, AWS documentation states explicitly: You cannot create a VPC peering connection between VPCs in different regions .
The HIPswitch Cloud and Virtual acts as an overlay gateway that secures devices so they can be instantly networked with other HIP Services, and is available across Amazon Web Services, Google Cloud, Microsoft Azure, Xen, VMware ESXi, Microsoft Hyper-V, Linux KVM, and Openstack.
Our client software enables you to give laptops, PCs, tablets, and smartphones a trusted and verifiable identity. By binding an identity to the device with a light-weight software application, the perimeter is moved from the network edge directly on to the device. This means you can give a workgroup of laptops micro-segmented access to any network resource from anywhere in the world in minutes, with minimal changes to the underlying switching and routing infrastructure. The HIPclient software is available for: Windows 7/8/10(32/64-Bit), macOS/OSX, and iOS.
The HIPserver software enables you to give servers a trusted and verifiable identity. The HIPserver behaves much like the HIPclient, but is also built to allow an organization to choose whether they want to completely cloak the server itself so only authenticated and authorized endpoints can discover and communicate with it.
IDN Routing: The HIPrelay
The HIPrelay is available as an add-on for the HIPswitch 500, HIPswitch 250, HIPswitch for Virtual, and HIPswitch for Cloud. As the world’s first identity-based router, it’s the only routing technology that doesn’t rely on Layer 3 rule sets, IP addresses, or traditional routing protocols to route and securely connect private and unrouteable IPs across separate LAN and WAN networks. Instead, the HIPrelay relies on host-based crypto-IDs to determine who and where to route the encrypted traffic. It’s also the only technology that can punch through impassable barriers like multi-NAT and Carrier Grade NAT.
|Packaging||Hardware ApplianceVirtual Appliance/VM ImageSoftware Application|
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.