The Zero Trust model of information security eliminates the assumption that there are “trusted” and “untrusted” networks. Zero Trust changes “trust but verify” into “verify and never trust” and takes a data-centric approach to security.
With the Certes Zero Trust security architecture, the trust model is no longer based on infrastructure or on which networks or devices you own or control. Instead, trust for WAN connectivity is based on keys and encryptors that are independent of the infrastructure.
The Certes Zero Trust security architecture consists of CryptoFlow® Creator, a management system offering point-and-click creation of data traffic protection policies. Policies are pushed to Certes encryptors sitting transparently in the network or data center. The encryptors inspect traffic and encrypt traffic using AES-256-GCM encryption.
CryptoFlow® Creator Software
CryptoFlow Creator software is web-based device management software that controls all Certes encryptors and encryption policy enforcement points. The software provides key, policy, and device management for all Certes Network encryptors.
Want to learn more?
One of our team members would be happy to help!