Build Instant Overlay Networks with IDN
The only identity-based architecture that unifies networking and security
Our IDN overlays are based on verifiable machine identities, introduced by the Host Identity Protocol (HIP), an IETF ratified standard. HIP enables an identity-first networking model by separating the identifier and locator roles of IP addresses, introducing a more secure and flexible namespace, the Host Identity Namespace (HIN).
HIP enables cloaking, making machines and networks invisible from everything except other explicitly trusted machines. Its also immune from MitM and DDoS attacks. To learn more, read the primer on HIP.
The Host Identity Namespace, which is compatible with legacy IP and DNS Namespaces, is what eliminates the complexities, lack of mobility, and vulnerabilities caused by products that base policy on the IP and DNS Namespaces. The Host Identity Namespace gives you the ability to set explicit trust policies and achieve IP mobility without disruption, and a more secure and mobile namespace. It also enables you to transcend from address-defined networking to identity-defined networking, where trust is based on provable, cryptographic identity.
Host Identity Protocol Creators
A better IP architecture
A better approach for unified secure networking and mobility
Trusted Identity-Defined Network Fabric
Policies are distributed by the Conductor, an advanced orchestration engine, and enforced by HIP (Host Identity Protocol) Service endpoints. Instantly provision, cloak, connect, segment, encrypt, migrate, revoke, or failover any IP-enabled device, group, or network within the Tempered Networks encrypted fabric
HIP establishes a third namespace, the Host Identity Namespace (fully compatible with IP and DNS Namespaces), freeing the IP addresses to be virtually anything - static, dynamic, private, public.
|Requirement||Traditional IP-based Technologies||Identity-based Technology|
|Instant overlay networks|
|Unified networking / security architecture|
|Micro-segmentation across LAN / WAN|
|High availability and resiliency|
|Access by explicitly trusted whitelisted machines|
|Instant revocation and quarantine|
|Instant micro / macro failover|
|Eliminate IP conflicts|