& cplSiteName &

Virtual Encryption a Safe Bet for Certes

Carol Wilson
7/7/2014
50%
50%

Virtualization is sometimes seen as a threat to makers of specialized hardware, but for encryption vendor Certes Networks, going virtual has opened up a new universe of possibilities for its network security expertise.

With its June release of CryptoFlow Solutions, Certes Networks Inc. has taken a deep dive into the NFV pool, producing a software-defined encryption solution that can protect any IT asset, including mobile devices, over a mixture of physical, virtual, and cloud environments.

The new software-based approach retains a core value of Certes' encryption -- the ability for the enterprise user to control the encryption keys and policies, says CMO Adam Boone. That approach enables an IT department, which will typically buy the encryption capabilities from a service provider, to implement and manage their own security.

Certes had sold hardware-based encryption for years but first developed its virtual offering in 2012, for use in the cloud to protect data moving into and out of those environments, Boone says. The company soon found, however, that makers of devices such as gateways, switches, and load balancers, were interested in bundling in the Certes software.

The move to a software-based solution proved timely in another respect: Enterprise customers were increasingly trying to manage more complex environments to include not only a mesh of network endpoints, but also a growing number of mobile devices from which their employees wanted to be able to access corporate data that needed to be secured.

"A single point-to-point encryption process was no longer adequate," Boone says.

The problem service providers and their enterprise customers face is that security systems today are very fragmented, with each portion of the network having its own different approach, as shown below.

Source: Certes Networks
Source: Certes Networks

"Compounding that problem is the fact that individual apps have their own security as well -- think of your email system," Boone adds. "It becomes an exponentially complex problem."

That complexity undermines the ability of enterprises and service providers to stay on top of the ever-changing world of network threats, he says.

What Certes says CryptoFlow Solutions can do is provide a single point of control for security managers. Security policy and management of security keys is decoupled from network management and control. The security manager for the enterprise can set policies for its data per application, device network, user, user group or virtual private network (VPN) group, and that policy and the necessary keys are pushed out to all appropriate enforcement points.

CryptoFlow enables a new generation of VPNs that are multi-point and don't require tunnels. They can be auto-configured on a per application basis, with flexible management of both the defining policies and the supporting keys and can support any device, any network and any cloud, Boone says.

Knowing that bring-your-own-device strategies are expanding, Certes is adding support for IoS-based Apple devices by year's end and Android devices in early 2015.

CryptoFlow was demonstrated live at Light Reading's Big Telecom Event (BTE), where it was part of an ETSI-approved NFV Proof of Concept sponsored by CenturyLink Inc. (NYSE: CTL). The demo also included orchestration by Cyan Inc. , physical devices and virtual software from RAD Data Communications Ltd. , and virtual firewalls from Fortinet Inc. (See NFV Gets Practical at BTE.)

— Carol Wilson, Editor-at-Large, Light Reading

(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
7/7/2014 | 4:51:46 PM
Important
I see virtual encryption becoming incredibly important over the next few years. The reason why I think this is because out of the box encryption offered by cloud providers, for example, is simply not enough. 

Organziations that want to have more control over data security are going to demand virtual encryption products. Control and customization is the name of the game in IT. 
Featured Video
From The Founder
The world of virtualization is struggling to wrench itself away from the claws of vendor lock-in, which runs counter to everything that NFV stands for.
Flash Poll
Upcoming Live Events
March 20-22, 2018, Denver Marriott Tech Center
March 22, 2018, Denver, Colorado | Denver Marriott Tech Center
March 28, 2018, Kansas City Convention Center
April 4, 2018, The Westin Dallas Downtown, Dallas
April 9, 2018, Las Vegas Convention Center
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
Has Europe Switched to a Fiber Diet? Not Yet...
Ray Le Maistre, Editor-in-Chief, 2/15/2018
Will China React to Latest US Huawei, ZTE Slapdown?
Ray Le Maistre, Editor-in-Chief, 2/16/2018
IBM, Microsoft Duke It Out Over Chief Diversity Hire
Sarah Thomas, Director, Women in Comms, 2/15/2018
5G: The Density Question
Dan Jones, Mobile Editor, 2/15/2018
T-Mobile Injects AI Into Customer Service
Kelsey Kusterer Ziser, Editor, 2/16/2018
Animals with Phones
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed