& cplSiteName &

Virtual Encryption a Safe Bet for Certes

Carol Wilson
7/7/2014
50%
50%

Virtualization is sometimes seen as a threat to makers of specialized hardware, but for encryption vendor Certes Networks, going virtual has opened up a new universe of possibilities for its network security expertise.

With its June release of CryptoFlow Solutions, Certes Networks Inc. has taken a deep dive into the NFV pool, producing a software-defined encryption solution that can protect any IT asset, including mobile devices, over a mixture of physical, virtual, and cloud environments.

The new software-based approach retains a core value of Certes' encryption -- the ability for the enterprise user to control the encryption keys and policies, says CMO Adam Boone. That approach enables an IT department, which will typically buy the encryption capabilities from a service provider, to implement and manage their own security.

Certes had sold hardware-based encryption for years but first developed its virtual offering in 2012, for use in the cloud to protect data moving into and out of those environments, Boone says. The company soon found, however, that makers of devices such as gateways, switches, and load balancers, were interested in bundling in the Certes software.

The move to a software-based solution proved timely in another respect: Enterprise customers were increasingly trying to manage more complex environments to include not only a mesh of network endpoints, but also a growing number of mobile devices from which their employees wanted to be able to access corporate data that needed to be secured.

"A single point-to-point encryption process was no longer adequate," Boone says.

The problem service providers and their enterprise customers face is that security systems today are very fragmented, with each portion of the network having its own different approach, as shown below.

Source: Certes Networks
Source: Certes Networks

"Compounding that problem is the fact that individual apps have their own security as well -- think of your email system," Boone adds. "It becomes an exponentially complex problem."

That complexity undermines the ability of enterprises and service providers to stay on top of the ever-changing world of network threats, he says.

What Certes says CryptoFlow Solutions can do is provide a single point of control for security managers. Security policy and management of security keys is decoupled from network management and control. The security manager for the enterprise can set policies for its data per application, device network, user, user group or virtual private network (VPN) group, and that policy and the necessary keys are pushed out to all appropriate enforcement points.

CryptoFlow enables a new generation of VPNs that are multi-point and don't require tunnels. They can be auto-configured on a per application basis, with flexible management of both the defining policies and the supporting keys and can support any device, any network and any cloud, Boone says.

Knowing that bring-your-own-device strategies are expanding, Certes is adding support for IoS-based Apple devices by year's end and Android devices in early 2015.

CryptoFlow was demonstrated live at Light Reading's Big Telecom Event (BTE), where it was part of an ETSI-approved NFV Proof of Concept sponsored by CenturyLink Inc. (NYSE: CTL). The demo also included orchestration by Cyan Inc. , physical devices and virtual software from RAD Data Communications Ltd. , and virtual firewalls from Fortinet Inc. (See NFV Gets Practical at BTE.)

— Carol Wilson, Editor-at-Large, Light Reading

(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
7/7/2014 | 4:51:46 PM
Important
I see virtual encryption becoming incredibly important over the next few years. The reason why I think this is because out of the box encryption offered by cloud providers, for example, is simply not enough. 

Organziations that want to have more control over data security are going to demand virtual encryption products. Control and customization is the name of the game in IT. 
Featured Video
From The Founder
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
Flash Poll
Upcoming Live Events
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
Millimeter Wave 5G: The Usain Bolt of Wireless?
Dan Jones, Mobile Editor, 4/12/2018
Australia's Optus on Back Foot After 'Anglo Saxon' Job Ad
Ray Le Maistre, Editor-in-Chief, 4/13/2018
Is Gmail Testing Self-Destructing Messages?
Mitch Wagner, Mitch Wagner, Editor, Enterprise Cloud, Light Reading, 4/13/2018
BDAC Blowback – Ex-Chair Arrested
Mari Silbey, Senior Editor, Cable/Video, 4/17/2018
Animals with Phones
I Heard There Was a Dresscode... Click Here
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed