Networking 3.0 is a unified networking and security architecture that delivers identity to your networks and endpoints, and allows you to centrally manage these identities in a highly dynamic and scalable way.
Networking 1.0 and 2.0:
Networking with No Native Security or Mobility
Networking 1.0 was about simple connectivity on a 1-to-1 scale, networking PCs and servers on early versions of IP networks.
Today, 2.0 is focused on networking everything, especially mobile devices and IoT devices. However, in the current world of increased and converged connectivity, the lack of assured identities is a compounding problem that makes networking much more complex and costly.
Networking Trusted Identities with Native Security and Mobility
Tempered Networks is the first to commercially leverage the Host Identity Protocol (HIP), which binds permanent, location-independent cryptographic identities to machines or networks. Recognized by the Internet Engineering Task Force (IETF) community as the next possible big change in IP architecture, HIP delivers flexible networking of only verifiable and trusted identities.
Moving the Network Perimeter Down to Individual Machines or Hosts
Scalable Virtual Micro-Perimeters
Unlike VPN technology that drops the encrypted connections at the network perimeter, IDN delivers machine-to-machine encryption down to the individual device, regardless of network or location.
With identity-based routing, you can now connect systems that don’t have publically accessible IP addresses. For example, this means you can for the first time connect devices on separate LTE networks that only allow outbound connections.
Identity-Based Routing: The HIPrelay Moving the Network Perimeter