Cloak

To render trusted devices invisible by only allowing communication when a machine is authenticated and authorized before a TCP session is established so they cannot be viewed, queried, or detected by anything outside a Tempered Networks’ secure overlay network. This occurs between a network’s Layer 2 to Layer 4 infrastructure and effectively makes the network invisible from all untrusted machines.