CERTES ENFORCEMENT POINT (CEP) APPLIANCES
The FIPS 140-2 and Common Criteria EAL4+ certified Certes Enforcement Points (CEPs) are multi-layer encryption appliances that provide data protection and application segmentation. Delivering security products that have been tested and validated against these rigorous standards is critical to help organizations and government agencies comply with data protection regulations.
These CEPs integrate easily into any existing network and operate transparently to the network infrastructure, which ensures all data is encrypted without impacting network performance.
The CEPs are interoperable with our key management software, CryptoFlow® Net Creator, and are easy to install, scalable for any size infrastructure, and simple to manage. With dedicated CEP appliances, customers experience high encryption throughput without impacting performance.
With ultimate simplicity and flexibility, CEPs are used to support encryption at any network layer, providing security management and protection for Layer 2, Layer 3 and Layer 4 networks.
For more information, see our Certified CEPs, Standard CEPs and Virtual CEPs.
CRYPTOFLOW® NET CREATOR SOFTWARE
CryptoFlow® Net Creator (CFNC) is a centralized key management system that provides full control of your security posture. With a user-friendly GUI and drag-and-drop tool, you have the ability to define and deploy policies with ease from one central point of control.
CFNC is both FIPS 140-2 and Common Criteria EAL4+ certified. Delivering security products that have been tested and validated against these rigorous standards is critical to help organizations and government agencies comply with data protection regulations.
AUTOMATED & UNATTENDED
CFNC centralizes and automates control of keys and policies at an enterprise scale. It enables the generation of keys to protect the entire network infrastructure, including crypto-segmentation, which removes the implicit trust we traditionally place in our network infrastructure by creating reduced scopes of trust to securely separate data flows between applications and workloads.
In addition, the management platform allows for key rotations to be scheduled at intervals that you choose. Once scheduled, key rotations are automatic without the need for staff oversight.
With ultimate simplicity and flexibility, CFNC is used to support encryption at any network layer, providing security management and protection for Layer 2, Layer 3 and Layer 4 networks.
To download the CFNC data sheet, please click here.
A technology solution that is simple, scalable and uncomplicated.
Get In Contact Today
Want to learn more? One of our team members would be happy to help!