Tempered Networks is a provider of technology solutions for cyber security, serving organizations across the public sector, including Federal agencies, municipalities, and State and Local Government. We cater to organizations that must safeguard their business critical networks, control systems, and trade secrets, and other valuable assets that are being connected via IP-based networks. These assets are prime targets for cyber criminals since TCP/IP is so vulnerable. Tempered Networks squarely solves the inherent security problems with TCP/IP, unlike existing security solutions that are bolted on security products.

We deliver the industry’s most robust security platform that defies the complexities and overcomes the human error associated with current security products. Our company protects businesses from brand-tarnishing and costly cyber attacks by cloaking vital systems and endpoints, using private overlay networks with military-grade security. The company is building the foundation of a secure Internet through automated orchestration of identity and trust management. 


  • HIPswitch Conductor & SimpleConnect

    The HIPswitch Conductor is a scalable orchestration engine that coordinates configuration, security policies, trust relationships, monitoring and analytics between the SimpleConnect User Interface (UI) and distributed HIPswitches.

    The SimpleConnect UI enables single-pane-of-glass administration throughout the lifecycle of a deployment. Once HIPswitch security appliances register to the HIPswitch Conductor, a user logged into the SimpleConnect UI is able to:

    • Create secure private overlay network with HIPswitches
    • Delegate management of each private network to authorized users
    • Define protected devices behind each HIPswitch
    • Configure communication security policies for HIPswitches and devices
    • Govern, audit and monitor private networks, HIPswitches and devices
    • Establish connectivity over any mix of cellular, Wi-Fi, wired Ethernet or SatCom network
  • HIPSwitch 100

    Consists of small form factor, industrially hardened security appliances with a secure network throughput of 7 Mbps. They are DIN rail or wall-mountable (optional), accept a wide range of power input and can connect to the shared network with a wired Ethernet, WiFi, or cellular connection. The HIPswitch-100v is a virtual HIPswitch for laptop or desktop computers that enables highly constrained remote access.

  • HIPswitch 200

    Consists of medium form factor, industrially hardened security appliances with a secure network throughput of 15 Mbps. They are DIN rail mountable (optional), accept a wide range of DC input, can connect to the shared network with a wired Ethernet, WiFi, or 3g cellular connection and support failover across these different connection types.

  • HIPswitch 300

    A physical, 1U rack mount data-center grade security appliance, with a secure network throughput of 60 Mbps, 4 ports on the device network and 2 ports on the shared network. The HIPswitch-300v is a virtual security appliance that can be deployed within data-center and cloud environments.

  • HIPswitch 400

    A physical 1U rack mount, data-center grade security appliance, with a secure network throughput of 850 Mbps, 4 ports on the device network and 2 ports on the shared network.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Archived Events


Latest News

The host identity protocol is emerging as an alternative way to secure a range of physical endpoints beyond laptops and smartphones.
As the number of devices connected to the internet explodes — analysts estimate there will be more than 30 billion within the next five years — so open many more doors through which ...
There are no silver bullets. That’s a widely held truism in the cybersecurity realm. But now a Seattle start-up has set out to commercialize breakthrough technology its founders believe holds the ...
Today, more and more things are being connected to the Internet… things like refrigerators that tell you the weather and remind you you’re out of eggs, smart TV’s you can control with a ...
The Internet was never engineered with security in mind. IPv4 was built for resilience and reliability, not security. There are a lot of bad people who take advantage of this fact and plenty of good ...
November 20, 2014
HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses. HIP uses public key identifiers from a ...


The aviation industry has perhaps the most complex and integrated information and communications technology (ICT) of any industry. This extremely competitive market gives way to rapid innovation of new technologies to improve operational ef ciency, safety, and customer service. Adoption of new ...

Tempered Networks meets the cyber security and connectivity needs for organizations who require uncompromised protection for the business critical infrastructure, information and assets. Our breakthrough security platform eliminates the complexities and overcomes the human error associated with cu...

Modern buildings, warehouses, and other facilities are increasing business efficiency and safety through the use of building automation systems (BAS). From IP cameras and energy management to environmental control systems, BASs, like most smart devices, require a high degree of integration with...

A Canadian wastewater utility needed to bolster the security and connectivity of its critical SCADA infrastructure. Through the implementation of the Tempered Networks solution, the utility was able to securely connect remote sites to its main SCADA network; manage network access privileges g...

The Tempered Networks solution is a network segmentation product based on the International Society of Automation (ISA) TR100.15.01 architecture. The solution is used to create private overlay networks on top of shared network infrastructure. In the parlance of Internet Engineering Task Force (IE...

To improve safety and operational ef ciency, rail carriers are increasing connectivity and automation through intelligent train control and rail signaling systems, and among telecommunications, SCADA (wayside devices), and other systems. Class I railroads are under pressure to expand the use o...

Increasing automation and connectivity of industrial control systems (ICS) across distributed power generation facilities is creating an increased attack surface. For cost-efficiency, network resources are often shared by multiple business users throughout the enterprise, blurring the traditional on...

Increasing connectivity and automation for production, pipeline, and processing systems is improving operational ef ciency for oil and gas companies, but it is also expanding the attack surface. The diversity of networks and devices on drilling rigs and in remote installations increases vulnera...

Tempered Networks automates connectivity and network security for distributed devices over trusted and untrusted network infrastructure. The Tempered Networks product line provides a centrally managed security appliance solution that meets the network integration challenges facing the modern industr...

After Microsoft announced that it would no longer be supporting or issuing security updates for Windows XP, a major university needed to quickly secure the vulnerable XP machines that submit parking transactions to its onsite parking management software. The Tempered Networks solution allowed...