Government

Simple digital transformation for government

Tempered Networks is the pioneer of Identity-Defined Networking (IDN), a unified secure networking architecture that introduces trust within networks using cryptographic identities.

IDN delivers an instant networking overlay platform that is highly available, radically secure, and remarkably simple. By transforming how organizations network, provision, and secure IP resources across any remote, enterprise, and cloud infrastructures, it’s now possible to bridge layer 2 and layer 3 networks, without modifications to underlying switching and routing infrastructure.

For the first time, it’s now simple to instantly connect, segment, cloak (make IP resources invisible), and disconnect any device, over any network, anywhere in the world. The result is simple, secure, and cost-effective connectivity to classified networks with peer-to-peer encryption that allows mission partners to traverse any unclassified, internet, or non-DoD network to get back to mission solutions from anywhere in the world.

Tempered Networks Breakthrough
Cloaking Technology
 

Requirements for assured host identities

The concept of assured identities is already being investigated by numerous branches of the U.S government. The Defense Information Security Agency (DISA) recently posted a Request For information (RFI) MAC0120, which stated:

“The solution shall not use Internet Protocol (IP) addresses or Media Access Control (MAC) address as the primary identifiers for server and workstation authenticated scan results. Because IP addresses change over time and devices may have multiple IP addresses, the DoD does not consider the use of IP addresses to describe devices and to drive remediation actions to be a workable long-term solution for servers and workstations.”

Tempered Networks is the only commercially available solution based on an open standard protocol from the Internet Engineering Task Force (IETF) which introduces a trusted networking model based on assured identities.

   The Host Identity Protocol - Dr. Andrei Gurtov

Common operating environment

IDN delivers powerful orchestration of unique cryptographic identities that makes it simple to instantly connect, protect, and disconnect any device, over any network, anywhere in the world. With a software-defined architecture that supports a high degree of automation and synchronization across networks, it’s now possible for the first time to achieve secure connectivity spanning multiple networking domains – across datacenters, public and private clouds, campus networks, remote locations, and unmanaged networks.

Cloaking

Tempered Networks has developed a security platform that “cloaks” critical systems and endpoints by establishing secure communications between cryptographic identities. Now organizations can cloak critical infrastructure (e.g networks, control systems, endpoints, etc.) from threat-action reconnaissance (see figure 1).

Cloaked endpoints and networks have no visible TCP/IP footprint and are invisible to the underlying network and any untrusted devices or systems. By cloaking critical infrastructure from attackers’ visibility, the solution stops attacks before they start, which protects against DDOS, MiTM attacks, IP spoofing and other types of network and transport layer attacks.




Step 1 of the Cyber Kill Chain cannot take place because endpoints are invisible from the underlying network.

Regulatory Requirements

NIST Risk Management Framework

Tempered Networks helps organizations to significantly reduce risk by introducing a trusted networking model based on assured cryptographic identities.

NIST Cybersecurity
Framework (CSF)

As of May 11, 2017, all federal agencies are now required to adopt the CSF in accordance with Executive Order: Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.

With Tempered Networks, you can align with the CSF Core and achieve secure connectivity and segmentation at scale for any device, anywhere in the world, across any network environment.

FIPS 140-2

Our cryptographic module meets the overall requirements applicable to Level 3 security of FIPS 140-2.

OMB Circular A-130

IDN delivers real time knowledge of the networked environment, together with proactive risk management: 

  • Legacy Systems Protection
  • Protection of high value assets
  • Significant reduction in IT resources to provision, maintain, and sustain