PITTSBURGH – April 14, 2015 – Certes Networks, a leading innovator in security solutions to protect networked applications, today announced CryptoFlow App, the industry’s first security solution to safeguard enterprise applications over any network for any user on any device, blocking the top attack vector used in all major data breaches.
CryptoFlow App is the first user-aware and application-aware solution for protecting sensitive data traffic and is the industry’s only software-defined security product for encrypting data in motion.
Now IT managers have a single point of control to automatically crypto-segment application flows across networks inside or outside the enterprise and grant access to these CryptoFlows based on a user’s security profile. Sensitive applications are isolated and controlled end-to-end, from the application server to the user’s end-point devices, regardless of where they are.
The new solution is an extension of Certes’ award-winning CryptoFlow security products, the centerpiece of Certes’ perfect 15-year track record of 7,000 product deployments in 70 countries without a single hack of any protected application.
CryptoFlow App solution sets will be demonstrated for the first time at RSA 2015 in San Francisco starting April 21. They include:
CryptoFlow LAN: Providing strong crypto-segmentation of internal enterprise application flows based on user roles, blocking the top attack vector used in data breaches around the world. CryptoFlow LAN provides automatic security to users connected on the LAN, isolates sensitive applications to only authorized users, and protects applications when hackers get past firewalls.
CryptoFlow B2B: Enabling enterprises to safely extend internal applications to external partners, including contractors, suppliers, trading partners and others beyond the enterprise perimeter. CryptoFlow B2B limits authorized business partners to only the applications they need, protecting the most sensitive applications even when business partners have been compromised.
CryptoFlow Mobile: Securing application traffic to mobile devices, smartphones and tablets, including personal BYOD end-points. Now enterprise IT and security managers can automatically extend enterprise apps to mobile devices with end-to-end security and a single point of control across a wide range of mobile devices inside or outside the enterprise.
“Today’s enterprise applications are borderless and easily shared, but the security architecture has not kept pace with this evolution,” said John Lochow, CEO of Certes. “In every major data breach of the past two years, hackers exploited inadequate security of networked applications and cut through the firewalls with ease. Our CryptoFlow App solutions are the first products to directly address this major gap. As thousands of product deployments have shown, our customers are protected even when the rest of the security architecture fails.”
CryptoFlow App automatically matches users to applications with the provisioned security profile based on a company’s business compliance and data protection needs. Certes’ powerful CryptoFlow Creator and CryptoFlow Enforcer products do the rest, automatically decomposing and enforcing policies on data traffic moving through enterprise network environments, on external networks, the Internet and in the Cloud.
CryptoFlow solutions provide simple, point-and-click application security, dramatically accelerating the rollout of new enterprise applications by cutting months of security architecture design and review. Now applications can be safely deployed faster, with a bigger user footprint, and at lower risk.
About Certes Networks
Certes Networks protects data in motion with market-leading software-defined security solutions. The company’s award-winning CryptoFlow® Solutions safeguard application traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network device or application performance. Companies around the world rely on security solutions from Certes Networks to protect access, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.