|By Marketwired .||
|June 17, 2014 04:57 PM EDT||
PITTSBURGH, PA -- (Marketwired) -- 06/17/14 -- Certes Networks, a leading innovator in encryption solutions to protect networked applications, today unveiled CryptoFlow Solutions, the industry's first products to combine virtualized networking functionality with the most powerful cryptography for data protection and traffic integrity.
CryptoFlow Solutions enable enterprises, government institutions and service providers to easily and dynamically protect any application flowing to any IT asset over any network with a single point of control for encryption management and keying. As part of a software-defined security strategy, CryptoFlow Solutions protect sensitive data in mixed physical, virtual and Cloud environments, with zero impact on network or application performance.
The CryptoFlow Solutions are part of a European Telecommunications Standards Institute (ETSI) Proof of Concept of Distributed Network Function Virtualization (NFV). Led by CenturyLink, the PoC features a Certes' CryptoFlow Solutions encryptor operating as a Virtualized Network Function with virtualization and orchestration products from other vendors.
With flow-through encryption policy definition and automated enforcement, CryptoFlow Solutions safeguard application traffic containing sensitive data such as credit card and financial information, healthcare patient records, student records and proprietary information over trusted and untrusted networks.
CryptoFlow Solutions are based on enhanced versions of the company's award-winning Certes Enforcement Point (CEP) product lines, which secure multiple Terabits of sensitive traffic every second for customers in 70 countries around the world. The most security-conscious enterprises in financial services, government, education, utilities, healthcare and other sectors rely on Certes' patented solutions for protecting sensitive data.
Certes' security policy enforcement points sit in the physical network or virtual environment processing traffic and applying encryption based on an enterprise or service provider's security policies. With CEP version 4.0, these enforcement points are available as self-contained hardware-accelerated appliances scaling to 10 Gbps, or as fully virtualized enforcement points, known as Virtual CEPs (vCEPs).
The new solutions enable security managers to create CryptoFlow VPNs, which are fully meshed, multi-point, group-keyed VPNs featuring auto-configuration of lower layer encryption. With a CryptoFlow VPN, a security manager can identify and seamlessly protect traffic flows containing sensitive data and ensure traffic is encrypted end-to-end with a single point of control. A CryptoFlow VPN safeguards traffic at multiple network layers, at variable speeds, or in an environment of mixed physical, virtual and Cloud-based resources.
"We've seen some of the biggest data breaches in history in recent months, costing companies billions. It's clear that traditional IT security has not kept pace with the new world of borderless applications and porous network borders," said John Lochow, CEO of Certes Networks. "Certes CryptoFlow Solutions are designed to protect sensitive data traffic even when a firewall is breached and network borders are compromised."
A CryptoFlow VPN completely offloads and decouples all encryption processing and management from the network and from applications themselves, fully separating traffic security management from network and application management. Now security of data in motion is not dependent on highly fragmented controls across many different systems or network layers, but can be managed with a single point of control across all networks and applications.
"RAD has teamed with Certes because its encryption solutions offer advanced deployment flexibility and simple configuration to secure virtualized connectivity in enterprise and service provider environments," said Noam Weisman, Head of Applications Ecosystem at RAD. "For that reason, vCEP CryptoFlow was accepted into RAD's D-NFV Alliance, an ecosystem of virtualized applications tested by RAD and offered alongside our ETX-2 customer edge Distributed NFV (D-NFV) platform. The Certes vCEP provides traffic encryption as a virtual function for security-conscious enterprises protecting sensitive data traffic."
CryptoFlow Solutions are available now from leading IT resellers worldwide. For more information or to locate a reseller serving your area, visit certesnetworks.com, call Certes at +1-888-833-1142 or +1-412-262-2571, or email [email protected]
About Certes Networks
Certes Networks protects data in motion. The company's CryptoFlow Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network or application performance. Customers rely on Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.
Big Data is amazing, it's life changing and yes it is changing how we see our world. Big Data, however, can sometimes be too big. Organizations that are not amassing massive amounts of information and feeding into their decision buckets, smaller data that feeds in from customer buying patterns, buying decisions and buying influences can be more useful when used in the right way. In their session at Big Data Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positi...
May. 24, 2015 05:30 AM EDT Reads: 2,291
JFrog on Thursday announced that it has added Docker support to Bintray, its distribution-as-a-service (DaaS) platform. When combined with JFrog’s Artifactory binary repository management system, organizations can now manage Docker images with an end-to-end solution that supports all technologies. The new version of Bintray allows organizations to create an unlimited number of private Docker repositories, and through the use of fast Akamai content delivery networks (CDNs), it decreases the dow...
May. 24, 2015 05:30 AM EDT Reads: 3,144
More organizations are embracing DevOps to realize compelling business benefits such as more frequent feature releases, increased application stability, and more productive resource utilization. However, security and compliance monitoring tools have not kept up and often represent the single largest remaining hurdle to continuous delivery. In their session at DevOps Summit, Justin Criswell, Senior Sales Engineer at Alert Logic, Ricardo Lupo, a Solution Architect with Chef, will discuss how to ...
May. 24, 2015 05:15 AM EDT Reads: 2,953
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
May. 24, 2015 05:00 AM EDT Reads: 1,231
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
May. 24, 2015 05:00 AM EDT Reads: 4,169
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
May. 24, 2015 05:00 AM EDT Reads: 2,105
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
May. 24, 2015 05:00 AM EDT Reads: 4,196
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
May. 24, 2015 05:00 AM EDT Reads: 4,573
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
May. 24, 2015 04:30 AM EDT Reads: 2,982
The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for applica...
May. 24, 2015 04:30 AM EDT Reads: 2,636
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
May. 24, 2015 04:30 AM EDT Reads: 3,039
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
May. 24, 2015 04:15 AM EDT Reads: 4,814
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
May. 24, 2015 04:00 AM EDT Reads: 4,731
After a couple of false starts, cloud-based desktop solutions are picking up steam, driven by trends such as BYOD and pervasive high-speed connectivity. In his session at 15th Cloud Expo, Seth Bostock, CEO of IndependenceIT, cut through the hype and the acronyms, and discussed the emergence of full-featured cloud workspaces that do for the desktop what cloud infrastructure did for the server. He also discussed VDI vs DaaS, implementation strategies and evaluation criteria.
May. 24, 2015 04:00 AM EDT Reads: 4,384
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understand...
May. 24, 2015 04:00 AM EDT Reads: 4,276