Whitepapers & Briefs

PCI DSS Compliance


Tempered Networks Identity-Defined Networking (IDN) platform compliance with PCI DSS V3.2. Product applicability guide to assist in supporting payment card industry data security standard v3.2 compliance
SANS ICS Survey

Get informed with actionable intelligence on critical control systems that help drive, monitor, and process our vital global resources. Read the 2017 SANS ICS Security survey.

ESG Lab Review

ESG Lab report documents their hands-on testing of IDN use cases and validation of our ‘identity-first’ approach for secure networking.


 

NIST Cybersecurity Framework

With Tempered Networks, you can align with the CSF Core and achieve secure connectivity and segmentation at scale for any device, anywhere in the world, across any network environment.
Networking 3.0 Whitepaper

With a modern networking architecture based on cryptographic identities, organizations now have a flexible and secure architecture where only provably cryptographically identifiable devices are connected.
Technical Whitepaper

A deeper technical dive of the IDN architecture - the world's first solution that enables connectivity for any device, anywhere in the world, even across separate layer 2 and layer 3 networks.

 

Primer on Host Identity Protocol

How HIP evolves the traditional IP networking paradigm. By Dr. Andrei Gurtov, Principal Scientist at the Helsinki Institute for Information Technology HIIT, and a senior member of IEEE and ACM.
Industrial Control Systems

A better way to connect and protect industrial control systems and assets. Now organizations can instantly and securely connect separate networks and a variety of devices and machines.
IDN Solution Brochure

A quick overview on the value of IDN. Our IDN fabric lets you dynamically connect anything, anywhere – even private and non-routable resources – across physical, virtual, cloud or cellular networks.

 

IDN Overview

2-pager overview on the value of IDN. Our IDN fabric lets you dynamically connect anything, anywhere – even private and non-routable resources – across physical, virtual, cloud or cellular networks.
NIST Manufacturing Profile

The CSF “Manufacturing Profile” can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices.
NERC-CIP Compliance

IDN doesn't just facilitate compliance; it delivers real and demonstrated security hardening, resilience, and network elasticity, helping your organizations meet NERC-CIP standards.