The Zero Trust model of information security eliminates the assumption that there are “trusted” and “untrusted” networks. Zero Trust changes “trust but verify” into “verify and never trust” and takes a data-centric approach to security.

With the Certes Zero Trust security architecture, the trust model is no longer based on infrastructure or on which networks or devices you own or control. Instead, trust for WAN connectivity is based on keys and encryptors that are independent of the infrastructure.

The Certes Zero Trust security architecture consists of CryptoFlow® Creator, a management system offering point-and-click creation of data traffic protection policies. Policies are pushed to Certes encryptors sitting transparently in the network or data center. The encryptors inspect traffic and encrypt traffic using AES-256-GCM encryption.

CryptoFlow® Creator Software

CryptoFlow Creator software is web-based device management software that controls all Certes encryptors and encryption policy enforcement points. The software provides key, policy, and device management for all Certes Network encryptors.

Our Encryption Appliance Product Line Includes:

High Assurance Encryptors

CEP220
CEP250
CEP300
CEP420
CEP520

Virtual Encryptors

vCEPKVM
vCEPESXi

Common Encryptors/Servers

CEP200
CEP400
CEP410
CEP500

Want to learn more?

One of our team members would be happy to help!