Light Reading
Embracing virtualization has opened up new markets for Certes Networks' encryption capabilities.

Virtual Encryption a Safe Bet for Certes

Carol Wilson
7/7/2014
50%
50%

Virtualization is sometimes seen as a threat to makers of specialized hardware, but for encryption vendor Certes Networks, going virtual has opened up a new universe of possibilities for its network security expertise.

With its June release of CryptoFlow Solutions, Certes Networks Inc. has taken a deep dive into the NFV pool, producing a software-defined encryption solution that can protect any IT asset, including mobile devices, over a mixture of physical, virtual, and cloud environments.

The new software-based approach retains a core value of Certes' encryption -- the ability for the enterprise user to control the encryption keys and policies, says CMO Adam Boone. That approach enables an IT department, which will typically buy the encryption capabilities from a service provider, to implement and manage their own security.

Certes had sold hardware-based encryption for years but first developed its virtual offering in 2012, for use in the cloud to protect data moving into and out of those environments, Boone says. The company soon found, however, that makers of devices such as gateways, switches, and load balancers, were interested in bundling in the Certes software.

The move to a software-based solution proved timely in another respect: Enterprise customers were increasingly trying to manage more complex environments to include not only a mesh of network endpoints, but also a growing number of mobile devices from which their employees wanted to be able to access corporate data that needed to be secured.

"A single point-to-point encryption process was no longer adequate," Boone says.

The problem service providers and their enterprise customers face is that security systems today are very fragmented, with each portion of the network having its own different approach, as shown below.

Source: Certes Networks
Source: Certes Networks

"Compounding that problem is the fact that individual apps have their own security as well -- think of your email system," Boone adds. "It becomes an exponentially complex problem."

That complexity undermines the ability of enterprises and service providers to stay on top of the ever-changing world of network threats, he says.

What Certes says CryptoFlow Solutions can do is provide a single point of control for security managers. Security policy and management of security keys is decoupled from network management and control. The security manager for the enterprise can set policies for its data per application, device network, user, user group or virtual private network (VPN) group, and that policy and the necessary keys are pushed out to all appropriate enforcement points.

CryptoFlow enables a new generation of VPNs that are multi-point and don't require tunnels. They can be auto-configured on a per application basis, with flexible management of both the defining policies and the supporting keys and can support any device, any network and any cloud, Boone says.

Knowing that bring-your-own-device strategies are expanding, Certes is adding support for IoS-based Apple devices by year's end and Android devices in early 2015.

CryptoFlow was demonstrated live at Light Reading's Big Telecom Event (BTE), where it was part of an ETSI-approved NFV Proof of Concept sponsored by CenturyLink Inc. (NYSE: CTL). The demo also included orchestration by Cyan Inc. , physical devices and virtual software from RAD Data Communications Ltd. , and virtual firewalls from Fortinet Inc. (See NFV Gets Practical at BTE.)

— Carol Wilson, Editor-at-Large, Light Reading

(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
7/7/2014 | 4:51:46 PM
Important
I see virtual encryption becoming incredibly important over the next few years. The reason why I think this is because out of the box encryption offered by cloud providers, for example, is simply not enough. 

Organziations that want to have more control over data security are going to demand virtual encryption products. Control and customization is the name of the game in IT. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
From The Founder
Is your network built on 'The Old IP,' or are you part of 'The New IP' revolution?
LRTV Documentaries
A Cultural Shift for an OTT World

9|26|14   |   01:41   |   (3) comments


Telcos need to embrace a new approach to partnerships if they are to generate extra revenues quickly and give customers what they want.
LRTV Documentaries
New Skills Needed as Telecom, IT Collide

9|26|14   |   4:07   |   (1) comment


As telecom and IT collide, new technologies are emerging, new skills are needed and new opportunities for women are arising.
UBB Forum News
Do IP Networks Need An Overhaul?

9|25|14   |   02:01   |   (0) comments


As traffic levels ramp, do IP networks need new technologies and topologies?
LRTV Documentaries
Sprint Wields Its Influence in the Valley

9|25|14   |   3:09   |   (10) comments


Anne-Louise Kardas, Sprint's connection to startups in the Valley, explains how telcos can be innovative and find new opportunities with partners.
LRTV Documentaries
SDN, NFV & The Future of XO's Network

9|25|14   |   3:47   |   (0) comments


XO Communications COO Don MacNeil explains how cloud, SDN and NFV are altering its network requirements as well as changing data centers of the future.
UBB Forum News
The OTT Conundrum

9|24|14   |   01:39   |   (0) comments


What is holding back prosperous partnerships between telcos and the OTT players?
LRTV Documentaries
Putting Broadband to Work

9|24|14   |   01:26   |   (0) comments


High-speed broadband network rollout is key to telco strategies, but it's what happens after the network is built that counts.
Light Reedy
Light Reading's Women in Telecom Recap

9|24|14   |   0:55   |   (4) comments


Our first Women in Telecom breakfast was a huge success, and we hope you'll join us in London for the next event on November 6.
UBB Forum News
Monetizing Ultra-Broadband

9|24|14   |   01:43   |   (2) comments


Ultra-broadband networks need to be built, with fiber-to-the-premises the ultimate goal, but they need to be monetized, too.
LRTV Huawei Video Resource Center
Sales Director of INIT on Plug & Play Switch Devices

9|19|14   |   3:21   |   (0) comments


INIT Italy uses both the Huawei S5700 and S7700 series switches for the campus LAN environment. Sales Director Andrea Curti says their company chose these Huawei devices over others because of their performance, flexible scalability and plug-and-play features.
LRTV Huawei Video Resource Center
Saudi Arabia Upgrades Vocational Training System

9|19|14   |   3:31   |   (0) comments


The Technical and Vocational Training Corporation (TVTC) has 100,000 students, 150 government-owned institutions and oversees 1000 private institutes. The CIO of TVTC explains that Huawei devices have allowed them to manage multiple datacenters using just one software program, scientifically tracking the progress of students and teachers, saving them millions.
LRTV Huawei Video Resource Center
Huawei's Media Solutions Are Here to Stay

9|19|14   |   4:35   |   (0) comments


The current media revolution requires rapid upgrades in technology. New formats (HD, 3D, 4K etc.) and the subsequent explosion of file sizes demand sophisticated network and storage architecture. Social media and the multiple distribution channels require a robust asset management system. Gartner analyst Venecia Liu speaks about the current technological trends in ...
Upcoming Live Events
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
Half of the world's population will be connected to the Internet by 2017, but not just by smartphones and desktops.
Hot Topics
Facebook Pokes Around LTE Direct
Sarah Reedy, Senior Editor, 9/25/2014
Sprint Wields Its Influence in the Valley
Sarah Reedy, Senior Editor, 9/25/2014
US Ignite Cultivates Gigabit Apps
Jason Meyers, Senior Editor, Utility Communications/IoT, 9/25/2014
Comcast Turns Off Streampix
Mari Silbey, Independent Technology Editor, 9/26/2014
Like Us on Facebook
Twitter Feed