Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Networking

    Tempered Networks Rolls Out Enhanced Platform for IIoT Security

    Written by

    Zeus Kerravala
    Published October 1, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      IoT, or internet of things, is still an emerging technology as IT and business leaders struggle with understanding how the world changes when everything is connected. The one area of IoT where connecting things has been commonplace for more than a decade is the industrial IoT (IIoT) world. Building control systems, factory equipment, machinery and other things have been on their own network as connectivity makes those systems better.

      Digital transformation requires IT-OT convergence. Some in IT circles were not aware of this, because these devices have been managed by the operational technology (OT) groups in companies, but more and more there’s a desire to bring IT and OT together. This lets data be aggregated for machine-learning purposes and creates some process efficiency. The downside of IIoT becoming part of IT’s scope is securing the systems.

      Legacy security tools and approaches don’t scale in a hyperconnected world

      One could attempt using traditional, internal firewalls and use ACLs, VPNs and VLANs, but that’s very expensive and not scalable. Also, while that approach has been around for a while, it’s very rigid, making it less than ideal for the dynamic nature of IIoT. This creates a problem for cybersecurity pros that are now tasked with securing IIoT.

      Recently, Tempered Networks announced what it claims is the first purpose-built IIoT cybersecurity platform, which enables businesses to secure IIoT networks without the manual and financial overhead of firewalls, VLANs, ACLs and VPNs. The complexity of doing this in hyperconnected environments can take the IT team from being over-burdened to being unable to do their jobs. The vendor accomplishes this with an overlay solution that encrypts and isolates IIoT traffic by creating a logical air gap.

      Tempered Networks uses micro-segmentation to protect IIoT environments

      Tempered’s approach is to use micro-segmentation to create a secure overlay to the existing data network. This overlay approach makes it easier to secure east-west traffic as well as north-south. Firewalls are great at the former but do not have the agility to handle the latter.

      (For the record: “East-west” traffic refers to traffic within a data center — i.e. server-to-server traffic. “North-south” traffic is client-to-server traffic, between the data center and the rest of the network, or anything outside the data center.)

      One of the unique aspects of the Tempered Networks solution is that it was built with the assumption that hyper-connectivity and endpoint mobility were the norm. Its most recent update expands on this vision and includes the following enhancements.

      • Granular port isolation is how Tempered defines the groups of interfaces that are upstream from machines on different segments. While this feature is available on most switches, Tempered offers multiple segmented overlay networks, each with their own set of policies, within a single Tempered HIPswitch. This lets customers segment zones of traffic within the data center as well as between cloud, on premises and virtual environments and make it look like a single environment.
      • Policy based network objects is how Tempered co-exists with existing management schemes because  administrators can run the network the way they want using Tempered. This can be particularly valuable though in migrating from a traditional address-based environment to an identity based one.
      • Snort integration enables deeper inspection for malware detection and the ability to identify malicious traffic on a network. Snort is a very popular security tool and should enable Tempered to look deeper than just layer 4.
      • Simplified and more scalable managed service provider (MSP) and independent software vendor (ISV) management. HIPswitches now support multiple layer 3 active underlay interfaces for multi-tenant and mulit-homing cabilities. These links can be configured in multiple active / standby modes using new failover groups.
      • Reduced network complexity. The enhanced platform enables customers to replace edge switches, internal firewalls, VPNs, cellular modems and other infrastructure reducing OpEx and CapEx.

      All of these new product enhancements are available to Tempered Networks customers today at no charge if they have a maintenance agreement.

      IIoT requires new ways of thinking about security

      IIoT environments require a different type of security tool. The massive number of IIoT devices being exposed to the Internet has increased the attack surface for most industries by at least an order of magnitude. The product updates to Tempered Networks enhances micro-segmentation for industrial networks to protect the IIoT endpoints without requiring perimeter-based security tools.

      Using the wrong tool for the job never works. Trying to hammer a nail with a wrench or remove a Phillips screw with a slot head always creates a bad situation. In the area of securing IIoT, legacy firewalls and VPNs were never designed for the rigors of IIoT. Don’t misread my words; firewalls and VPNs are incredibly important, but they secure different types of threats.

      Zeus Kerravala is an eWEEK regular contributor and the founder and principal analyst with ZK Research. He spent 10 years at Yankee Group and prior to that held a number of corporate IT positions.

      Zeus Kerravala
      Zeus Kerravala
      https://zkresearch.com/
      Zeus Kerravala is an eWEEK regular contributor and the founder and principal analyst with ZK Research. He spent 10 years at Yankee Group and prior to that held a number of corporate IT positions. Kerravala is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.