Identity-Defined Networking (IDN)

Policy Orchestration + Identity-Based Enforcement

We offer the industry’s simplest, most secure and elastic networking fabric providing ubiquitous and trusted connectivity anywhere your business needs to be. With our broad IDN product portfolio, ranging from physical hardware, virtual and cloud appliances, to client, server, and even embedded software, the IDN’s encrypted fabric can stretch end-to-end across your entire organization securely connecting any IP resource, even previously non-routable endpoints.

The IDN’s cloaked and unbreakable segments eliminate up to 90% of attack vectors, reduce provisioning and mitigation time by 97%, and lower costs by as much as 25%. Network and security teams can now become more agile while significantly reducing business risk.

IDN components Overview


How the IDN fabric works

The Conductor – Simple IDN Orchestration

The Conductor enables the simple orchestration of IDN policies to every IDN endpoint, called HIP Services, that enforce policy within the fabric.

The ability to instantly connect or revoke trusted communications between any endpoint based on provable identity can now be easily achieved. In less than a few minutes a cloaked, isolated, and encrypted overlay of traditionally non-routable systems can be created and connected with a few clicks of the mouse.


Simply select the system(s) you want to network based on trust. Only these systems will be discoverable and can be connected to one another. All communication will be encrypted end-to-end between systems that otherwise would not be able to be routed or peered directly to one another.


The Conductor’s Visual Trust Map shows an encrypted network overlay based on the instant policy creation shown above. The ability to overcome impassable networking barriers to enable instance-to-instance peering between VPC regions and even separate clouds is just one example of the simplicity and power of IDN orchestration. No other systems are authorized or will be allowed to communicate in this overlay because of IDN HIP Services’ enforcement.

HIP Services: Powerful IDN Enforcement

Tempered Networks’ HIP Services are software products that enforce the Conductor’s provisioning, de-provisioning, and revocation of trusted communication for any IP-enabled hosts or devices within the IDN fabric. HIP Services are available as either physical, virtual, or cloud appliances, as software installed directly on a client or server, or can be embedded in a custom application or hardware.

HIP Services provide cloaking, automatic encryption, identity-based routing, and global IP mobility, as well as micro-, macro-, and cross-boundary isolation / segmentation.