& cplSiteName &

Virtual Encryption a Safe Bet for Certes

Carol Wilson
7/7/2014
50%
50%

Virtualization is sometimes seen as a threat to makers of specialized hardware, but for encryption vendor Certes Networks, going virtual has opened up a new universe of possibilities for its network security expertise.

With its June release of CryptoFlow Solutions, Certes Networks Inc. has taken a deep dive into the NFV pool, producing a software-defined encryption solution that can protect any IT asset, including mobile devices, over a mixture of physical, virtual, and cloud environments.

The new software-based approach retains a core value of Certes' encryption -- the ability for the enterprise user to control the encryption keys and policies, says CMO Adam Boone. That approach enables an IT department, which will typically buy the encryption capabilities from a service provider, to implement and manage their own security.

Certes had sold hardware-based encryption for years but first developed its virtual offering in 2012, for use in the cloud to protect data moving into and out of those environments, Boone says. The company soon found, however, that makers of devices such as gateways, switches, and load balancers, were interested in bundling in the Certes software.

The move to a software-based solution proved timely in another respect: Enterprise customers were increasingly trying to manage more complex environments to include not only a mesh of network endpoints, but also a growing number of mobile devices from which their employees wanted to be able to access corporate data that needed to be secured.

"A single point-to-point encryption process was no longer adequate," Boone says.

The problem service providers and their enterprise customers face is that security systems today are very fragmented, with each portion of the network having its own different approach, as shown below.

Source: Certes Networks
Source: Certes Networks

"Compounding that problem is the fact that individual apps have their own security as well -- think of your email system," Boone adds. "It becomes an exponentially complex problem."

That complexity undermines the ability of enterprises and service providers to stay on top of the ever-changing world of network threats, he says.

What Certes says CryptoFlow Solutions can do is provide a single point of control for security managers. Security policy and management of security keys is decoupled from network management and control. The security manager for the enterprise can set policies for its data per application, device network, user, user group or virtual private network (VPN) group, and that policy and the necessary keys are pushed out to all appropriate enforcement points.

CryptoFlow enables a new generation of VPNs that are multi-point and don't require tunnels. They can be auto-configured on a per application basis, with flexible management of both the defining policies and the supporting keys and can support any device, any network and any cloud, Boone says.

Knowing that bring-your-own-device strategies are expanding, Certes is adding support for IoS-based Apple devices by year's end and Android devices in early 2015.

CryptoFlow was demonstrated live at Light Reading's Big Telecom Event (BTE), where it was part of an ETSI-approved NFV Proof of Concept sponsored by CenturyLink Inc. (NYSE: CTL). The demo also included orchestration by Cyan Inc. , physical devices and virtual software from RAD Data Communications Ltd. , and virtual firewalls from Fortinet Inc. (See NFV Gets Practical at BTE.)

— Carol Wilson, Editor-at-Large, Light Reading

(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
7/7/2014 | 4:51:46 PM
Important
I see virtual encryption becoming incredibly important over the next few years. The reason why I think this is because out of the box encryption offered by cloud providers, for example, is simply not enough. 

Organziations that want to have more control over data security are going to demand virtual encryption products. Control and customization is the name of the game in IT. 
Featured Video
From The Founder
The 'gleaming city on a hill,' Steve Saunders calls it. But who is going to take us from today's NFV componentry to the grand future of a self-driving network? Here's a look at the vendors hoping to make it happen.
Flash Poll
Upcoming Live Events
September 28, 2017, Denver, CO
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Royal Garden Hotel
November 1, 2017, The Montcalm Marble Arch
November 2, 2017, 8 Northumberland Avenue, London, UK
November 10, 2017, The Westin Times Square, New York, NY
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Could the Connected Car Help Prevent Terrorism?
Dan Jones, Mobile Editor, 9/15/2017
Could 5G Have Found Its Glass Ceiling?
Dan Jones, Mobile Editor, 9/20/2017
Cities Slam FCC on Broadband Proceedings
Mari Silbey, Senior Editor, Cable/Video, 9/15/2017
1 Million Pirate Set-Top Boxes Sold in the UK
Aditya Kishore, Practice Leader, Video Transformation, Telco Transformation, 9/20/2017
Comcast Shuts Down OTT Again
Mari Silbey, Senior Editor, Cable/Video, 9/19/2017
Animals with Phones
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed