IP complexity is holding your business back

A fundamentally flawed trust model drives network complexity and cost

 

 

The way we use IP is flawed

Currently, the IP address is used to determine both the identity and location of a device on the network. This dual functionality of the IP address lacks the basic mechanisms for security and mobility, which causes most networking and security challenges today. Even the creators of TCP/IP have acknowledged if they could go back and do it over again, they would include provable host identities from the start.
 

Learn More

Washington Post: Net of Insecurity - A flaw in the TCP/IP design


 

 

 

Vint Cerf: Co-creator of TCP/IP
The flawed foundation of IP


 

 

Host Identity Protocol Creators
A better IP architecture

Introducing trusted identities for security and networking

The Host Identity Protocol is an open standard that fixes the broken trust model of current IP networking, by introducing cryptographic identities and a new secure namespace. HIP was first proposed by Bob Moskowitz in 1999 as a way to solve the fundamental flaw in TCP/IP networking: using an IP address for both location and identity of a host or service on the network.

Ratified by the Internet Engineering Task Force (IETF), HIP delivers an improved IP architecture with authentication, authorization, and IP mobility based on cryptographic identities.
 

Learn More

A Primer on Host Identity Protocol - Dr. Andrei Gurtov


 

Bob Moskowitz - Father of HIP
Why HIP is revolutionary

 

Richard Paine
Author of "Beyond HIP: The End to Hacking as We Know It"


 

A proven (and much-needed) upgrade for IP networking

HIP has been in use for over 12 years at a Fortune 100 company to address security and networking challenges within the defense and aerospace industry until commercialized. Organizations now have a simpler approach to solving some of the most difficult networking and security challenges.