SEATTLE, WA--(Marketwired - Dec 15, 2015) - Tempered Networks, Inc., a provider of secure connectivity for business critical infrastructure, communications and information, today announced that it has been recognized by SC Magazine as a 2015 Security Innovator for security infrastructure. Tempered Networks was also honored by SC Magazine in last year's review of 2014 Security Innovators.

According to the SC Magazine write-up by Peter Stephenson, technology editor, "Tempered Networks' system uses cryptographic trust management and the company's orchestration tool, the Conductor, to manage the trust relationships in real time. This approach cloaks devices in an overlay network on top of TCP/IP, taking away the IP footprint. This tends to simplify networking because the overlay is a flat network. Viewing this Innovator's system in the context of the kill chain, it stops the recon step. The idea is that you can't breach what you can't see."

"It's an honor to be recognized by SC Magazine as a leading security infrastructure innovator," said Jeff Hussey, CEO of Tempered Networks. "We are pioneering this market and have taken a different approach from most traditional security solutions, as we tackle the root cause of insecure IP networks using HIP (Host Identity Protocol) and automating trust relationships through orchestration. In the crowded cyber security market, it's quite gratifying that Tempered Networks is rising above the noise and making a positive impact on customers -- not just for security, but also for network simplification." 

Related Information

About Tempered Networks

Tempered Networks meets the cyber security and connectivity needs for enterprises that require uncompromised protection for their business critical infrastructure. Our security platform provides a breakthrough approach to networking by enabling organizations to 'cloak' critical systems, communications, and vulnerable endpoints, with end-to-end encryption. Cloaked endpoints and network segments have no TCP/IP footprint and are invisible to any untrusted device on the underlying shared network. We start with zero trust, only allowing whitelisted endpoints onto Tempered identity-based overlay networks. Single pane-of-glass management cuts complexity by automating the setup and ongoing maintenance of your Tempered Networks deployment. It enables easy and rapid network micro-segmentation to reduce an organization's attack surface. Our proven technology has been in development and production for over 10 years at a Fortune 50 company and was recently commercialized for the broader market. We have customers across the commercial, industrial and public sectors deploying 'well tempered' networks today. For more information go to

You can also follow us @TemperedNW on Twitter or visit us on LinkedIn for more information about Tempered Networks and our technology.

Forward-looking statements. Certain statements contained in this press release may constitute forward-looking statements. Such statements include, for example, statements regarding the Company's or management's beliefs, expectations, estimations, plans, projections and similar statements. Any such forward-looking statements involve risks, uncertainties and other factors that may cause the Company's actual results and performance, or industry results to be materially different from any results or performance expressed or implied by such forward-looking statements. These forward-looking statements speak only as of the date of this press release and there can be no assurance that the results and events contemplated by such forward-looking statements will, in fact, occur. The Company expressly disclaims any obligation or undertaking to release any updates or revisions to any forward-looking statement contained herein.