Sponsored By

Startup Tempered Networks Takes Aim at IoT SecurityStartup Tempered Networks Takes Aim at IoT Security

New products give IT a way to create a zero-trust model of security -- that is, trust nothing and build the trust relationships as needed.

Zeus Kerravala

May 25, 2016

3 Min Read
No Jitter logo in a gray background | No Jitter

New products give IT a way to create a zero-trust model of security -- that is, trust nothing and build the trust relationships as needed.

The Internet of Things (IoT) is a much-discussed topic these days, with smart this and smart that and our rapid movement into a world in which everything is connected. But in this IoT world security has been, and will continue to be, the top barrier for quite some time.

Metcalfe's Law states that the value of a network is proportional to the square of the number of nodes connected. So as we add more nodes to a network, the value grows exponentially. Hence the networks in a world in which everything is connected has substantially more value than a network with some things connected or parallel networks.

While connecting all of these endpoints does indeed enable organizations to develop new processes and streamline operations, it opens the door to security risks, too. Many IoT devices don't have any inherent security capabilities and can create back doors into other network segments. That many IoT applications rely heavily on mobile devices and cloud services creates even more security risks. The fact is, IoT networks have many more entry points than legacy networks, and perimeter-based security methods will not provide effective security for them.

Enter startup Tempered Networks, which yesterday announced a new release of its IP security platform targeted at simplifying the process of securing IoT endpoints regardless of whether they are dedicated devices, running on Windows, or in the cloud. The Tempered solution, called Identity-Defined Network (IDN) Fabric, is enabled through Host Identity Protocol (HIP), which changes the way IP networks operate.

IP is built on the premise that everything should talk to everything, and then security gets layered on top and provisioned node by node. This means each additional device makes the security equation increasingly complex. HIP, on the other hand, is built on the assumption that nothing connects to anything and has security baked into it. Then IT can provision trust maps to enable devices that need to talk to each other to do so.

In a hospital, for example, IT might want to create a trust relationship through which medical devices can only talk to other medical devices. In a retail environment, IT might want to set up a trust relationship between kiosks and a warehouse system. With traditional security, IT could accomplish this through a combination of virtual private network connections, access control lists, and other settings -- but once the network gets to any kind of significant size at all (greater than 10 endpoints) the configuration overhead becomes onerous and difficult to set up and maintain.

You can think of a HIP-enabled overlay network as a secure fabric that uses the device's identity to create connections. This masks the complexity of the underlying network and fluid perimeter, and enables IT to dynamically secure the environment in a way that's easy to set up and maintain.

Tempered offers a number of ways to HIP-enable connected endpoints. These include:

In addition, Tempered is releasing a new version of the Tempered Networks Conductor, which is a centralized orchestration engine that coordinates configuration, security policies, trust relationships, monitoring, and analytics between the management user interface and the HIP-enabled endpoints in the IDN Fabric.

The Conductor upgrades include:

The IoT era is here, and IT professionals must focus on creating a zero-trust model of security -- that is, trust nothing and build the trust relationships as needed. Without this approach, IT departments will find securing the environment to be a never-ending battle in which they fall further and further behind. Tempered's IDN Fabric creates a scalable, visual way of enabling IoT security that's straightforward to set up and manage as the number of connected endpoints grows.

Follow Zeus Kerravala on Twitter and Google+!
@zkerravala
Zeus Kerravala on Google+

About the Author

Zeus Kerravala

Zeus Kerravala is the founder and principal analyst with ZK Research.

Kerravala provides a mix of tactical advice to help his clients in the current business climate and long term strategic advice. Kerravala provides research and advice to the following constituents: End user IT and network managers, vendors of IT hardware, software and services and the financial community looking to invest in the companies that he covers.

Kerravala does research through a mix of end user and channel interviews, surveys of IT buyers, investor interviews as well as briefings from the IT vendor community. This gives Kerravala a 360 degree view of the technologies he covers from buyers of technology, investors, resellers and manufacturers.

Kerravala uses the traditional on line and email distribution channel for the research but heavily augments opinion and insight through social media including LinkedIn, Facebook, Twitter and Blogs. Kerravala is also heavily quoted in business press and the technology press and is a regular speaker at events such as Interop and Enterprise Connect.

Prior to ZK Research, Zeus Kerravala spent 10 years as an analyst at Yankee Group. He joined Yankee Group in March of 2001 as a Director and left Yankee Group as a Senior Vice President and Distinguished Research Fellow, the firm's most senior research analyst. Before Yankee Group, Kerravala had a number of technical roles including a senior technical position at Greenwich Technology Partners (GTP). Prior to GTP, Kerravala had numerous internal IT positions including VP of IT and Deputy CIO of Ferris, Baker Watts and Senior Project Manager at Alex. Brown and Sons, Inc.

Kerravala holds a Bachelor of Science in Physics and Mathematics from the University of Victoria in British Columbia, Canada.