Case Studies

Disaster Recovery

The judiciary of a U.S. state needed to protect backup data being sent to disaster recovery sites. But it had to do so without compromising network performance. Learn how Certes' solutions delivered high-performance security for disaster recovery communications.

Ministry of Foreign Affairs

Protecting governmental communications is mission critical, especially when those communications cross borders and traverse a range of networking technologies. The Ministry of Foreign Affairs (MoFA) for a European nation turned to Certes Networks’ CryptoFlow solutions for a flexible, scalable WAN security solution to protect essential communications traversing the globe.

Multinational Manufacturing

A Fortune 500 company needed to share highly sensitive information among its facilities in seven countries on three continents. Find out how the company used Certes' solutions to protect mission-critical operational and product data without increasing the risk of a data breach.

National Bank

A major national bank can't risk sending millions of financial transactions over Wide Area Networks that it does not control. See how a national bank adopted a Certes' solution to protect and control the data communications to hundreds of regional offices and branches.

Regional Bank

Communications like VoIP need to be protected when they carry sensitive data. But performance cannot be compromised for these important applications. See how a financial institution used Certes' WAN solution to secure its real-time applications between sites without affecting performance.

Data Sheets


Rack Mount -1U, Up to 250 Megabits


Rack Mount -1U, Up to 1 Gigabit


Rack Mount -2U, Up to 10 Gigabit


Small Form Factor, Up to 20 Megabits


Small Form Factor, Up to 200 Megabits


Rack Mount Appliance - 1U, Up to 1 Gigabit


Rack Mount Server - 1U, Up to 1 Gigabit


Rack mount - 1U, Up to 1 Gigabit


CryptoFlow Net Solutions enable you to set automatic traffic protection policies on any standards-based network, including LAN, WAN, WiFi, Internet, SDN/NFV and others. Solution components include CryptoFlow® Net Creator, CryptoFlow Net Enforcer, CryptoFlow Net Enforcer - Virtual Certes Enforcement Point(vCEP).


Virtualized environments: VMware, KVM


Encryption Without Compromise

Certes Networks’ Layer 4 Stealth Encryption allows businesses to increase security without compromising infrastructure or business agility.

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) comes into effect May 25, 2018, but right now many companies don’t have the security systems in place to meet GDPR requirements.

Solution Notes

Certes Networks Zero Trust Security for Financial Services

Certes’ solutions safeguard hundreds of millions of financial records for enterprises worldwide, automatically encrypting data traffic to protect credit card data, financial transactions, consumer data, trading transactions, automated-teller machine traffic and other sensitive data.

Certes Zero Trust WAN (ZTWAN)

Certes’ unique encryption key management and trust model lets you safely use networking services and third-party resources while maintaining full control over the security of your data communications traffic.

Payment Cards – PCI DSS Compliance

Our approach of “deny everyone, permit by exception” protects both your network and your data. CryptoFlow Creator enables secure data transmissions, which assures the confidentiality, authenticity and integrity of data as it travels across any network, regardless of size, type or topology.

White Papers

Certes Networks General Data Protection Regulation

The General Data Protection Regulation (GDPR) will unify data privacy laws across Europe and protect all EU citizens data privacy, therefore it will reshape the way organizations across the region approach data privacy.

Certes Networks New York Department of Financial Services

The New York Department of Financial Services’ (NYDFS) introduction of ‘first-in-the-nation’ cybersecurity rules require banks, insurers, and other NYDFS-regulated financial services companies to adhere to stringent cybersecurity requirements.

Forrester TAP 2015

To protect sensitive enterprise applications from today’s attacks, experts advise IT security decision-makers to adopt a Zero Trust approach to IT security.

The Truth about MPLS

While many people believe MPLS and other “virtually private” WAN technologies are secure, the fact is that MPLS and most other WAN technologies offer no inherent data protection, data integrity or protection from mis-configurations.