You have a smart phone. Obviously. But is your case artful and reflective of your personality? You’re on LinkedIn and social media. Of course. But have you stretched into Snapchat and tried Periscoping live?
You’ve read the articles on growing cyber security threats. No question. But have you truly researched the most effective ways to protect your business?
We have and found one that’s pretty hip.
Gray Matter Systems is announcing a brand new solution to help industrial operations teams and IT departments effectively cloak and protect critical infrastructure, assets, and information to minimize exposure to cyber-security threats. It’s called the HIPApp.
HIP stands for Host, Identity and Protocol.
Today we’re getting the real story on what the HIPApp is and how it works from our partners at Tempered Networks. They gave us the inside information during an interview with their Director of Product Management, Lucas Kane.
Q: First question, Lucas – What does HIPApp stand for and what’s the naming significance?
LK: The HIPApp is a native application for Windows 7 & 10 machines. Installing a HIPApp embeds a cryptographic identity on the Windows machine and the identity can then be verified (and managed) by a Conductor.
A Conductor admin can then add the HIPApp (and therefore the Windows machine) into overlay networks and whitelist the HIPApp/Windows machine, enabling a laptop, for example, to securely communicate with protected devices that reside in Overlay networks.
Q: In simplest terms, what does the HIPApp do?
LK: The HIPApp embeds a virtual HIPswitch onto a Windows 7 or 10 machine. Once installed, the HIPApp will appear in the Conductor UI and can be managed in the same way that a HIPswitch protected device is managed.
Q: What’s the biggest mistake companies make right now when it comes to cyber security?
Q: How do you recommend companies solve this issue?
LK: We recommend that companies use a defense in depth approach that micro-segments their networks, facilitates end-to-end encryption, cloaks the devices on their WAN/LAN infrastructure networks and is easy to manage at scale.
Q: How is HIPApp different from other cyber security solutions?
LK: The HIPApp extends the footprint of the Tempered Networks solution. Windows 7 & 10 machines can now participate in Overlay networks. The difference between traditional security solutions and the Tempered solution is the ease of management at scale.
While the Tempered solution facilitates segmentation, end-to-end encryption, automated PKI, device base whitelisting and device cloaking, it does not require traditional security solution expertise and is easy to manage even at enterprise scale.
Q: Secure networking is so complex, how does HIPApp make it easier?
- The simplicity of the Tempered solution reduces the risk of misconfiguration
- The Tempered solution facilitates orchestration of a large number of devices and HIPservices
- The Tempered solution leverages device-based whitelisting so devices cannot communicate until they are specifically allowed to communicate. This is a reverse approach to traditional security solutions.
Q: Is there a savings and how?
The upfront cost of our physical, virtual and cloud HIPswitches and Conductors is on par with traditional solutions, however, the time to deploy and manage the Tempered solution is significantly reduced when compared side-by-side with traditional security solutions.
Q:What’s your favorite feature of the new solution?
Thanks to Lucas Kane from Tempered Networks for bringing us up to speed on the latest solutions in cyber security.
If this conversation with Lucas made sense to you, why not hear from Tempered Networks live at our annual user group conference in Put-in-Bay, OH?
Join their session, “A Modern Approach to Securing Critical Control Networks and Endpoints” to learn more about connecting and protecting new and legacy devices, while increasing visibility into your vital systems.