Page 12 - Cyber Warnings
P. 12
are cloaked and invisible from the underlying network. By hiding critical infrastructure, the attack
is stopped at the very first phase—recon—as attackers can’t see or identify which assets are on
the network or what data they may contain. The attack stops before it has a chance to begin.
The Much Needed Evolution of IP
The time has more than come to re-evaluate the Gremlin of Internet protocols, TCP/IP. The
Internet Engineering Task Force recently approved a standard-track network security protocol:
The Host Identity Protocol, which many in the IETF community recognize as the next big
change in IP-architecture. The protocol has been under development for nearly 20 years, in
coordination with standards bodies, as well as many large corporations (Verizon, Ericson,
Yokogawa, etc.).
HIP is an alternative encryption technology that was first deployed within the defense and
aerospace industry, where nation-state attacks occur every hour. Specifically designed to be
secure by default, HIP shifts the network trust model completely by introducing trusted
cryptographic identities within any network. It’s like the Gremlin riding around inside an armored
truck.
Not only does our solution help stop attacks before they begin, it removes another key enemy of
security—complexity. Through the simplicity of our centralized orchestration engine, the number
of IT administrators needed to maintain security is significantly reduced. An IT department can
maintain centralized governance of security, while assigning controls and access to designated
operations teams without compromising the safety of the network. Field personnel with basic IT
skills can now maintain and operate secure networks with limited technical support, and a
smaller number of skilled IT personnel can manage critical infrastructure security.
The threat landscape for any organization has radically changed within the last decade. To meet
these new challenges, we need to step away from the traditional solutions that have been
protecting networks for a long time, and into the 21st century. Rather than pouring thousands of
dollars and staff hours into trying to maintain a secure perimeter, moving to a new approach
makes security both stronger and more scalable. When cloaking becomes the new perimeter,
both operations and field teams can manage security easily and stop cyber attacks before they
have the chance to begin.
About the Author
Jeff Hussey has been the President and CEO of Tempered Networks since
August 2014. Hussey, the founder of F5 Networks, is an accomplished
entrepreneur with a proven track record in the networking and security
markets. He maintains several board positions across a variety of technology,
non-profit and philanthropic organizations and currently is the chairman of the
board for Carena and chairman and co-owner of Ecofiltro and
PuraVidaCreateGood.
12 Cyber Warnings E-Magazine – May 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide