Welcome!

News Feed Item

Certes Networks Launches Industry's First Encryption Solution for End-to-End Protection of Sensitive Data in Virtualized and Physical Networks

CryptoFlow Solutions Enable Enterprises, Government Institutions and Service Providers to Protect Any Application Flowing to Any IT Asset Over Any Network With a Single Point of Control

PITTSBURGH, PA -- (Marketwired) -- 06/17/14 -- Certes Networks, a leading innovator in encryption solutions to protect networked applications, today unveiled CryptoFlow™ Solutions, the industry's first products to combine virtualized networking functionality with the most powerful cryptography for data protection and traffic integrity.

CryptoFlow Solutions enable enterprises, government institutions and service providers to easily and dynamically protect any application flowing to any IT asset over any network with a single point of control for encryption management and keying. As part of a software-defined security strategy, CryptoFlow Solutions protect sensitive data in mixed physical, virtual and Cloud environments, with zero impact on network or application performance.

The CryptoFlow Solutions are part of a European Telecommunications Standards Institute (ETSI) Proof of Concept of Distributed Network Function Virtualization (NFV). Led by CenturyLink, the PoC features a Certes' CryptoFlow Solutions encryptor operating as a Virtualized Network Function with virtualization and orchestration products from other vendors.

With flow-through encryption policy definition and automated enforcement, CryptoFlow Solutions safeguard application traffic containing sensitive data such as credit card and financial information, healthcare patient records, student records and proprietary information over trusted and untrusted networks.

CryptoFlow Solutions are based on enhanced versions of the company's award-winning Certes Enforcement Point (CEP) product lines, which secure multiple Terabits of sensitive traffic every second for customers in 70 countries around the world. The most security-conscious enterprises in financial services, government, education, utilities, healthcare and other sectors rely on Certes' patented solutions for protecting sensitive data.

Certes' security policy enforcement points sit in the physical network or virtual environment processing traffic and applying encryption based on an enterprise or service provider's security policies. With CEP version 4.0, these enforcement points are available as self-contained hardware-accelerated appliances scaling to 10 Gbps, or as fully virtualized enforcement points, known as Virtual CEPs (vCEPs).

The new solutions enable security managers to create CryptoFlow VPNs, which are fully meshed, multi-point, group-keyed VPNs featuring auto-configuration of lower layer encryption. With a CryptoFlow VPN, a security manager can identify and seamlessly protect traffic flows containing sensitive data and ensure traffic is encrypted end-to-end with a single point of control. A CryptoFlow VPN safeguards traffic at multiple network layers, at variable speeds, or in an environment of mixed physical, virtual and Cloud-based resources.

"We've seen some of the biggest data breaches in history in recent months, costing companies billions. It's clear that traditional IT security has not kept pace with the new world of borderless applications and porous network borders," said John Lochow, CEO of Certes Networks. "Certes CryptoFlow Solutions are designed to protect sensitive data traffic even when a firewall is breached and network borders are compromised."

A CryptoFlow VPN completely offloads and decouples all encryption processing and management from the network and from applications themselves, fully separating traffic security management from network and application management. Now security of data in motion is not dependent on highly fragmented controls across many different systems or network layers, but can be managed with a single point of control across all networks and applications.

"RAD has teamed with Certes because its encryption solutions offer advanced deployment flexibility and simple configuration to secure virtualized connectivity in enterprise and service provider environments," said Noam Weisman, Head of Applications Ecosystem at RAD. "For that reason, vCEP CryptoFlow was accepted into RAD's D-NFV Alliance, an ecosystem of virtualized applications tested by RAD and offered alongside our ETX-2 customer edge Distributed NFV (D-NFV) platform. The Certes vCEP provides traffic encryption as a virtual function for security-conscious enterprises protecting sensitive data traffic."
CryptoFlow Solutions are available now from leading IT resellers worldwide. For more information or to locate a reseller serving your area, visit certesnetworks.com, call Certes at +1-888-833-1142 or +1-412-262-2571, or email [email protected]

About Certes Networks

Certes Networks protects data in motion. The company's CryptoFlow Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network or application performance. Customers rely on Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.

Media contact:
Sue O'Keefe
Calysto Communications
Email Contact
1-508-494-7771

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...