Welcome!

@CloudExpo Authors: Liz McMillan, Zakia Bouachraoui, Pat Romanski, Elizabeth White, Dana Gardner

News Feed Item

Certes Networks Launches Industry's First Encryption Solution for End-to-End Protection of Sensitive Data in Virtualized and Physical Networks

CryptoFlow Solutions Enable Enterprises, Government Institutions and Service Providers to Protect Any Application Flowing to Any IT Asset Over Any Network With a Single Point of Control

PITTSBURGH, PA -- (Marketwired) -- 06/17/14 -- Certes Networks, a leading innovator in encryption solutions to protect networked applications, today unveiled CryptoFlow™ Solutions, the industry's first products to combine virtualized networking functionality with the most powerful cryptography for data protection and traffic integrity.

CryptoFlow Solutions enable enterprises, government institutions and service providers to easily and dynamically protect any application flowing to any IT asset over any network with a single point of control for encryption management and keying. As part of a software-defined security strategy, CryptoFlow Solutions protect sensitive data in mixed physical, virtual and Cloud environments, with zero impact on network or application performance.

The CryptoFlow Solutions are part of a European Telecommunications Standards Institute (ETSI) Proof of Concept of Distributed Network Function Virtualization (NFV). Led by CenturyLink, the PoC features a Certes' CryptoFlow Solutions encryptor operating as a Virtualized Network Function with virtualization and orchestration products from other vendors.

With flow-through encryption policy definition and automated enforcement, CryptoFlow Solutions safeguard application traffic containing sensitive data such as credit card and financial information, healthcare patient records, student records and proprietary information over trusted and untrusted networks.

CryptoFlow Solutions are based on enhanced versions of the company's award-winning Certes Enforcement Point (CEP) product lines, which secure multiple Terabits of sensitive traffic every second for customers in 70 countries around the world. The most security-conscious enterprises in financial services, government, education, utilities, healthcare and other sectors rely on Certes' patented solutions for protecting sensitive data.

Certes' security policy enforcement points sit in the physical network or virtual environment processing traffic and applying encryption based on an enterprise or service provider's security policies. With CEP version 4.0, these enforcement points are available as self-contained hardware-accelerated appliances scaling to 10 Gbps, or as fully virtualized enforcement points, known as Virtual CEPs (vCEPs).

The new solutions enable security managers to create CryptoFlow VPNs, which are fully meshed, multi-point, group-keyed VPNs featuring auto-configuration of lower layer encryption. With a CryptoFlow VPN, a security manager can identify and seamlessly protect traffic flows containing sensitive data and ensure traffic is encrypted end-to-end with a single point of control. A CryptoFlow VPN safeguards traffic at multiple network layers, at variable speeds, or in an environment of mixed physical, virtual and Cloud-based resources.

"We've seen some of the biggest data breaches in history in recent months, costing companies billions. It's clear that traditional IT security has not kept pace with the new world of borderless applications and porous network borders," said John Lochow, CEO of Certes Networks. "Certes CryptoFlow Solutions are designed to protect sensitive data traffic even when a firewall is breached and network borders are compromised."

A CryptoFlow VPN completely offloads and decouples all encryption processing and management from the network and from applications themselves, fully separating traffic security management from network and application management. Now security of data in motion is not dependent on highly fragmented controls across many different systems or network layers, but can be managed with a single point of control across all networks and applications.

"RAD has teamed with Certes because its encryption solutions offer advanced deployment flexibility and simple configuration to secure virtualized connectivity in enterprise and service provider environments," said Noam Weisman, Head of Applications Ecosystem at RAD. "For that reason, vCEP CryptoFlow was accepted into RAD's D-NFV Alliance, an ecosystem of virtualized applications tested by RAD and offered alongside our ETX-2 customer edge Distributed NFV (D-NFV) platform. The Certes vCEP provides traffic encryption as a virtual function for security-conscious enterprises protecting sensitive data traffic."
CryptoFlow Solutions are available now from leading IT resellers worldwide. For more information or to locate a reseller serving your area, visit certesnetworks.com, call Certes at +1-888-833-1142 or +1-412-262-2571, or email [email protected]

About Certes Networks

Certes Networks protects data in motion. The company's CryptoFlow Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network or application performance. Customers rely on Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.

Media contact:
Sue O'Keefe
Calysto Communications
Email Contact
1-508-494-7771

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
Eggplant, the customer experience optimization specialist, announced the latest enhancements to its Digital Automation Intelligence (DAI) Suite. The new capabilities augment Eggplant’s continuous intelligent automation by making it simple and quick for teams to test the performance and usability of their products as well as basic functionality, delivering a better user experience that drives business outcomes.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and cost-effective resources on AWS, coupled with the ability to deliver a minimum set of functionalities that cover the majority of needs – without configuration complexity.
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactures motherboard chipsets, network interface controllers and integrated circuits, flash memory, graphics chips, embedded processors and other devices related to communications and computing.