Click here to close now.




















Welcome!

News Feed Item

Certes Networks Launches Industry's First Encryption Solution for End-to-End Protection of Sensitive Data in Virtualized and Physical Networks

CryptoFlow Solutions Enable Enterprises, Government Institutions and Service Providers to Protect Any Application Flowing to Any IT Asset Over Any Network With a Single Point of Control

PITTSBURGH, PA -- (Marketwired) -- 06/17/14 -- Certes Networks, a leading innovator in encryption solutions to protect networked applications, today unveiled CryptoFlow™ Solutions, the industry's first products to combine virtualized networking functionality with the most powerful cryptography for data protection and traffic integrity.

CryptoFlow Solutions enable enterprises, government institutions and service providers to easily and dynamically protect any application flowing to any IT asset over any network with a single point of control for encryption management and keying. As part of a software-defined security strategy, CryptoFlow Solutions protect sensitive data in mixed physical, virtual and Cloud environments, with zero impact on network or application performance.

The CryptoFlow Solutions are part of a European Telecommunications Standards Institute (ETSI) Proof of Concept of Distributed Network Function Virtualization (NFV). Led by CenturyLink, the PoC features a Certes' CryptoFlow Solutions encryptor operating as a Virtualized Network Function with virtualization and orchestration products from other vendors.

With flow-through encryption policy definition and automated enforcement, CryptoFlow Solutions safeguard application traffic containing sensitive data such as credit card and financial information, healthcare patient records, student records and proprietary information over trusted and untrusted networks.

CryptoFlow Solutions are based on enhanced versions of the company's award-winning Certes Enforcement Point (CEP) product lines, which secure multiple Terabits of sensitive traffic every second for customers in 70 countries around the world. The most security-conscious enterprises in financial services, government, education, utilities, healthcare and other sectors rely on Certes' patented solutions for protecting sensitive data.

Certes' security policy enforcement points sit in the physical network or virtual environment processing traffic and applying encryption based on an enterprise or service provider's security policies. With CEP version 4.0, these enforcement points are available as self-contained hardware-accelerated appliances scaling to 10 Gbps, or as fully virtualized enforcement points, known as Virtual CEPs (vCEPs).

The new solutions enable security managers to create CryptoFlow VPNs, which are fully meshed, multi-point, group-keyed VPNs featuring auto-configuration of lower layer encryption. With a CryptoFlow VPN, a security manager can identify and seamlessly protect traffic flows containing sensitive data and ensure traffic is encrypted end-to-end with a single point of control. A CryptoFlow VPN safeguards traffic at multiple network layers, at variable speeds, or in an environment of mixed physical, virtual and Cloud-based resources.

"We've seen some of the biggest data breaches in history in recent months, costing companies billions. It's clear that traditional IT security has not kept pace with the new world of borderless applications and porous network borders," said John Lochow, CEO of Certes Networks. "Certes CryptoFlow Solutions are designed to protect sensitive data traffic even when a firewall is breached and network borders are compromised."

A CryptoFlow VPN completely offloads and decouples all encryption processing and management from the network and from applications themselves, fully separating traffic security management from network and application management. Now security of data in motion is not dependent on highly fragmented controls across many different systems or network layers, but can be managed with a single point of control across all networks and applications.

"RAD has teamed with Certes because its encryption solutions offer advanced deployment flexibility and simple configuration to secure virtualized connectivity in enterprise and service provider environments," said Noam Weisman, Head of Applications Ecosystem at RAD. "For that reason, vCEP CryptoFlow was accepted into RAD's D-NFV Alliance, an ecosystem of virtualized applications tested by RAD and offered alongside our ETX-2 customer edge Distributed NFV (D-NFV) platform. The Certes vCEP provides traffic encryption as a virtual function for security-conscious enterprises protecting sensitive data traffic."
CryptoFlow Solutions are available now from leading IT resellers worldwide. For more information or to locate a reseller serving your area, visit certesnetworks.com, call Certes at +1-888-833-1142 or +1-412-262-2571, or email [email protected]

About Certes Networks

Certes Networks protects data in motion. The company's CryptoFlow Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network or application performance. Customers rely on Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.

Media contact:
Sue O'Keefe
Calysto Communications
Email Contact
1-508-494-7771

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Moving an existing on-premise infrastructure into the cloud can be a complex and daunting proposition. It is critical to understand the benefits as well as the challenges associated with either a full or hybrid approach. In his session at 17th Cloud Expo, Richard Weiss, Principal Consultant at Pythian, will present a roadmap that can be leveraged by any organization to plan, analyze, evaluate and execute on a cloud migration solution. He will review the five major cloud transformation phases a...
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Amazon and Google have built software-defined data centers (SDDCs) that deliver massively scalable services with great efficiency. Yet, building SDDCs has proven to be a near impossibility for ‘normal’ companies without hyper-scale resources. In his session at 17th Cloud Expo, David Cauthron, founder and chief executive officer of Nimboxx, will discuss the evolution of virtualization (hardware, application, memory, storage) and how commodity / open source hyper converged infrastructure (HCI) so...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the ...
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as...
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small,...
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
Mobile testing is getting harder: more devices, multiple operating systems, higher quality expectations and shorter development cycles. In his session at DevOps Summit, Tom Chavez, Senior Evangelist at SOASTA, will discuss the seven steps to improving your mobile testing process. Tom Chavez, with 20+ years of experience as a product manager in software development tools, works in product management at SOASTA, the leader in performance analytics. He has worked across the Silicon Valley at indu...