SEATTLE, WA — (Marketwired) — 10/23/17 — today announced a robust new release of its Identity-Defined Networking (IDN) software that extends IDN and the ability to –Bring Your Own Network– (BYON) to private workgroups and DevOps teams. The new release features HIPclient Automation that makes it simple to instantly create secure enclaves for workgroups to connect and protect sensitive data and intellectual property. Also available with this release is the HIP Cloud Connector that makes it easy to connect, segment, peer, and secure DevOps workloads within and across cloud providers. It removes the tight coupling of public cloud networks, which prevents peering between zones, regions, and separate cloud providers. In addition to its new IDN software release, the company has expanded its broad portfolio of IDN enforcement points, with today–s announcement of the , a flexible industrial IoT gateway.
“Our new release of IDN builds on our point and click simplicity that makes OT and IT teams incredibly efficient by doing away with tedious, manual and error prone configurations tied to all traditional IP-based products,” said Jeff Hussey, President and CEO of Tempered Networks. “It–s incredibly empowering for our customers, whether they are responsible for manufacturing systems, ATM networks, or PCI compliance, to instantly build overlay networks that are highly available, radically secure, and remarkably simple. Imagine being able to create an instant overlay network for a DevOps team spanning on-premises build servers to their cloud-based workloads running in a shared VPC. No other users on the shared corporate network or in the shared VPC could connect to or access those resources. With IDN, it–s now possible and simple. We call it –Bring Your Own Network–.”
Ongoing key design practices for Tempered Networks– solutions include ease-of-use and operational efficiency for customers. The latest IDN release raises the bar with the new HIPclient Automation and HIP Cloud Connector features.
Workgroup networking, micro-segmentation and access control becomes even simpler using HIPclient Automation. It–s now possible to automate networking and granular access control for different workgroups and for every enterprise client, based on verifiable machine identity. Workgroup members, internal or external to an organization, can securely access information and data wherever they–re located using LAN and WAN micro-segmentation and encryption that cannot be violated. The HIPclient contains both network and security policies so access control is moved from the network perimeter to the client itself and can–t be spoofed.
Whether clients are accessing workgroup resources using public WiFi, cellular networks, the WAN or the LAN, encrypted access control to explicitly allowed machines always remains in place
Only cloaked and segmented, machine-authenticated, and explicitly authorized clients can connect to a workgroup
Any changes to client and workgroup secure access can now be accomplished with a click of the mouse using the IDN orchestration engine
DevOps teams can quickly span, connect, and peer instances from any private or public cloud, without constraints. This also removes mobility constraints by enabling DevOps teams to directly access resources from anywhere, without having to modify or change policy as required today with VPNs, firewalls, and router ACLs.
Support workflows with segmented Development, Test, Staging, and Production Automation networks
Create highly repeatable and programmatic templates to instantly build and tear down networks
Easily spin up and tear down VPC and VNET access controls
“Within the current context of hybrid and multi-cloud IT, connecting hardware devices and applications to people is inherently complex, exacerbated by the constraints that accrue to NAT, CGNAT, firewall rules, and ACLs, as well as by the specific environments associated with each public cloud,” said Brad Casemore, research director for datacenter networking at IDC. “Tempered Networks seeks to abstract the complexity of IP-based networking with an identity-based architecture that automates network connectivity and provides granular access control for workgroups, assigning enforcement to the client itself rather than the network edge. The objective is to democratize and simplify networking so even non-technical staff can provision and manage the networks that support increasingly valuable applications.”
Tempered Networks–
Blog:
The new release of Tempered Networks– IDN platform will be available in November 2017. Please contact your preferred reseller for more information or .
is the pioneer of Identity-Defined Networking (IDN) enabling instant overlay networks that are highly available, remarkably simple, and radically secure. Networking can now be based on verifiable machine identity creating the industry–s most extensible and secure networking fabric that can instantly connect, protect, and revoke anything, anytime, anywhere. IDN overcomes impassable network provisioning barriers while hardening porous borders through cloaking, instant LAN/WAN micro-segmentation, automatic encryption, and identity-based routing. Your network becomes as adaptable as software, yet more secure, and simpler to manage. For more information, visit .
You can also follow us on or visit us on for more information about Tempered Networks and our technology.
Forward-looking statements. Certain statements contained in this press release may constitute forward-looking statements. Such statements include, for example, statements regarding the Company–s or management–s beliefs, expectations, estimations, plans, projections and similar statements. Any such forward-looking statements involve risks, uncertainties and other factors that may cause the Company–s actual results and performance, or industry results to be materially different from any results or performance expressed or implied by such forward-looking statements. These forward-looking statements speak only as of the date of this press release and there can be no assurance that the results and events contemplated by such forward-looking statements will, in fact, occur. The Company expressly disclaims any obligation or undertaking to release any updates or revisions to any forward-looking statement contained herein.
You must be logged in to post a comment Login