Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Tempered Networks Delivers First Purpose-Built IIOT Cybersecurity Platform

New Software Release Fills the Market Void for Secure IIOT Networking Without the Cost and Complexity of Firewalls or VPNs

Tempered Networks, Inc., the secure networking company, announced a new release of its award-winning Industrial IoT (IIoT) cybersecurity platform purpose-built to address the new demands of converged infrastructure. Deployed as a trusted layer over an existing network, the comprehensive solution delivers north/south and east/west micro-segmentation, multi-factor authentication, encryption, high availability, and ensures policy management at scale through centralized software-defined orchestration. New software enhancements build on Tempered Networks’ unified architecture that now encompasses edge switching. Customers realize substantial CapEx and OpEx savings by eliminating the need for point products like internal firewalls or VPNs, nor do administrators require advanced IT training to deploy and manage the solution.

Read More: Voyager Expands Blockchain Deposits and Withdrawals to 7 Cryptocurrencies

“The demands of our mobile, hyper-connected world have rendered traditional network security products irrelevant to the billions of IIoT devices now connecting to the internet,” said Jeff Hussey, CEO of Tempered Networks. “Enterprises are eager to reap the business benefits of IT/OT convergence, but need to understand the unique challenges and risks inherent with IIoT. Our platform provides micro-segmentation for any device on the network without requiring network upgrades, giving customers a superior alternative to the increasing complexity and costs associated with internal firewalls, legacy VPNs, ACLs, cell modems, and now edge switching.”

Details – New Software Capabilities
Related Posts
1 of 40,593

The new release builds on Tempered Networks’ IIoT platform that was purpose-built for today’s dynamic, hyper-connected world. Powerful enhancements to the company’s platform deliver unmatched security, visibility, and ease-of-use through a single pane-of-glass orchestration console. Highlights include:

  • Enhanced port isolation for easy management of granular security policies. Port isolation and VLAN tagging enables north/south and east/west micro-segmentation across all networks. Hardware HIPswitches offer the ability to isolate individual ports, allowing for multiple Layer 3 interfaces for traffic sets, and can function as a terminating router for multiple networks.
  • Intuitive and easier management with network objects. Network Object policies makes it easier to manage thousands of endpoints. Administrators can now whitelist an entire network with one click.
  • Superior visibility, control and resiliency with improved monitors, events and actions platform. Achieve greater visibility and monitoring with new Snort integration, an open source intrusion detection and prevention system. Customers get real-time traffic analysis with automated policy updates and monitors based on event detection.
  • Simplified and more scalable MSP/ISV management with multi-homing. HIPswitches now support multiple Layer 3 active underlay interfaces (port groups) and can be configured in multiple active/ standby modes using new failover groups. Customers can simplify connectivity from mixed networks (e.g. vendor management).
  • Extended platform functionality lowers TCO for IIoT networks. Enriched platform functionality allows customers to now replace edge switches, in addition to internal firewalls, VPNs, cellular modems, radios, and Modbus converters—reducing infrastructure complexity, CapEx and OpEx.

Read More: Velodyne Lidar Announces Second Annual World Safety Summit On Autonomous Technology

“Traditional firewall and VPN solutions were not architected for Industrial Internet of Things (IIoT) initiatives,” said Gabriel Lowy of TechTonics Advisors. “They were designed to protect against earlier generations of malware.  As such, they are no match for the IIoT threat environment.”

“The deluge of IoT devices being exposed to the Internet is greatly broadening the attack surface for a range of industries, but securing those endpoints is a huge challenge for enterprises,” said Paula Musich, research director at Enterprise Management Associates. “More often than not it falls to IT rather than the OT organization to secure those industrial endpoints. Extending micro-segmentation to industrial networks allows IT to protect those devices without the complexity of traditional perimeter security tools.”

Read More: Bitcoin’s New Normal Bottom Is $10,000: DeVere CEO

3 Comments
  1. Striptiz Kızlık bozma seks. Köleler, Marsha ve Callie Calypso efendilerini memnun edebilir s** porno kizlik bozma.
    Klinikteki hemşire hastayla hızlı kızlık bozma sikişmeleri bir şekilde seks
    yapmak istiyor. Bebeğim mastürbasyon kizlikbozmaporna.
    Asil orgy genç bakire bozma.

  2. Iron reclamation and reuse says

    Metal scrap baling Ferrous material reclaiming services Iron reclamation plant

    Ferrous material customer base, Iron reclamation depot, Metal reclamation facility

  3. Industrial copper recovery says

    Recycled copper ingots Market demand for recycled copper Metal waste repurposing services
    Copper cable types, Metal reclamation services, Copper scrap industry

Leave A Reply

Your email address will not be published.