Securing the IoT Frontier
BrandPost Tempered Networks

Securing the IoT Frontier

With Identity-Defined Networking, trust is based on provable, cryptographic identity If you think secure networking is a formidable challenge now, wait until you run up against the reality of millions of Internet of Things (IoT)...

01/09/18

IPv6 Is No Hail Mary
BrandPost Tempered Networks

IPv6 Is No Hail Mary

It may answer some prayers, but it fails to address the fundamental flaw in TCP/IP IP addresses function not only as an identifier, but also as a locator, which is a frequent cause of IT headaches. The location function causes...

01/02/18

Can Network Security and Business Agility Get Along?
BrandPost Tempered Networks

Can Network Security and Business Agility Get Along?

The simplicity of secure HIP-based networking offers relief for IT teams struggling to meet the demands of business units.  The demands for business agility and tighter security are in conflict. The first requires quick and...

12/26/17

Who (or What) Can You Trust?
BrandPost Tempered Networks

Who (or What) Can You Trust?

What if whitelisting were transparent to the end user and automated? The simplest way to secure networks is to start with zero trust and “whitelist” each and every device that is authorized to connect to the network. Then you only...

12/19/17

Addressing Network Complexity
BrandPost Tempered Networks

Addressing Network Complexity

Imagine creating and orchestrating 1 million containers—in less than two minutes. That’s a whole new dimension of IP management issues.  Almost all organizations depend on IP-based devices to ensure worker productivity. But few,...

12/12/17

Reining in Your Attack Surface
BrandPost Tempered Networks

Reining in Your Attack Surface

It’s growing by leaps and bounds, and we can largely blame it on the IP addressing scheme.  The attack surface of the modern enterprise is expanding at a rate that strains the ability of IT and security teams to keep track of it,...

12/05/17

The Ins and Outs of Micro-Segmentation
BrandPost Tempered Networks

The Ins and Outs of Micro-Segmentation

While It’s great for automating networks, it doesn’t readily address the security gap.  Security and networking professionals are getting excited by vendor promises that software defined networks and network virtualization enable...

11/28/17

How to Hide Your Address from Clever Hackers
BrandPost Tempered Networks

How to Hide Your Address from Clever Hackers

Locked in a pitched battle with cyber-attackers, organizations are nonetheless forging ahead with aggressive cloud and “Internet of Things” initiatives that drastically increase their threat exposure. Holding back progress is not...

11/21/17

Get HIP to Simple and Secure Networking
BrandPost Tempered Networks

Get HIP to Simple and Secure Networking

There is a better approach to security and networking—one where it’s easy to connect, route, and segment any device with a powerful orchestration engine. Not only that, but it essentially cloaks network devices from would-be...

11/14/17

Moving Beyond the Internet of Insecurity
BrandPost Tempered Networks

Moving Beyond the Internet of Insecurity

There’s a fundamental conflict between providing access to networks and securing sensitive data and systems. And when the network is based on Internet protocols designed to allow any computing device to communicate with any other,...

11/08/17

BrandPost Tempered Networks

Identity-based Routing: Moves the network perimeter to the device

Identity-based routing is an integral component of Identity-Defined Networking.  Secure end-to-end networking--based on verifiable identities--is now possible for anything, anywhere, across any environment. You can now instantly...

10/13/17

Load More