Policy Orchestration + Identity-Based Enforcement
We offer the industry’s simplest, most secure and elastic networking fabric providing ubiquitous and trusted connectivity anywhere your business needs to be. With our broad IDN product portfolio, ranging from physical hardware, virtual and cloud appliances, to client, server, and even embedded software, the IDN’s encrypted fabric can stretch end-to-end across your entire organization securely connecting any IP resource, even previously non-routable endpoints.
The IDN’s cloaked and unbreakable segments eliminate up to 90% of attack vectors, reduce provisioning and mitigation time by 97%, and lower costs by as much as 25%. Network and security teams can now become more agile while significantly reducing business risk.
IDN components Overview
How the IDN fabric works
The Conductor – Simple IDN Orchestration
The Conductor enables the simple orchestration of IDN policies to every IDN endpoint, called HIP Services, that enforce policy within the fabric.
The ability to instantly connect or revoke trusted communications between any endpoint based on provable identity can now be easily achieved. In less than a few minutes a cloaked, isolated, and encrypted overlay of traditionally non-routable systems can be created and connected with a few clicks of the mouse.
HIP Services: Powerful IDN Enforcement
Tempered Networks’ HIP Services are software products that enforce the Conductor’s provisioning, de-provisioning, and revocation of trusted communication for any IP-enabled hosts or devices within the IDN fabric. HIP Services are available as either physical, virtual, or cloud appliances, as software installed directly on a client or server, or can be embedded in a custom application or hardware.
HIP Services provide cloaking, automatic encryption, identity-based routing, and global IP mobility, as well as micro-, macro-, and cross-boundary isolation / segmentation.
Lightweight software products delivered for Hardware, Virtual, Cloud
Client solution for laptops, PCs, and tablets
Server solution for Windows Servers
Embed trusted identities across software and firmware