Certes Networks Provable Security™ is built on the Certes Five Pillars:
Pillar One: Policy Enforcement
Pillar Two: Crypto-segmentation
Pillar Three: Scalability
Pillar Four: Visibility
Pillar Five: Observability
Certes Networks Provable Security™ starts with the premise that policy enforcement is only as good as the policy defined and how that policy is enforced. While threats and vulnerabilities are virtually infinite, access to data is defined and is therefore finite and measurable. By enabling policy definition and enforcement at a highly granular level, risk can be eliminated and data security can be quantified, measured and outcomes driven.
Certes Pillar Two, Crypto-Segmentation creates a reduced scope of trust per policy, protected by encryption, to separate your applications and workloads.
Sean Everson, Chief Technology Officer, Certes Networks, comments: “Crypto-Segmentation removes the implicit trust we traditionally place in our network infrastructure by creating reduced scopes of trust to securely separate data flows between applications and workloads as defined by fine-grained policies, independent of the physical infrastructure or underlying network topology.”
The next pillar of Provable Security is Scalability. Certes Layer 4 solution is a scalable end-to-end encryption management solution that is network agnostic easily integrating into any existing network infrastructure, fully interoperable with the existing security stack and with zero impact to performance. Certes offers the ability to support multiple deployments across multi-vendor environments on any network or transport. With Certes Layer 4 technology, a customer can be sure that their data assurance posture will scale to support the depth and breadth of a customer’s environment, whether deployed top-of-rack, in a virtual environment, between data centers and applications (east to west) or simply just across the WAN or SD-WAN.
The Fourth Pillar of Certes Network Provable Security™ is Visibility. The Certes Layer 4 solution encrypts data in transit, allowing for secure encryption of only the payload enabling transparent deployment that operates independently of applications and the underlying network with zero changes to routers, switches and firewalls. Network visibility and operational functionality are thereby fully maintained with zero impact to performance.
The last Pillar is Observability, the linchpin that provides real-time contextual meta-data enabling rapid detection of out-of-policy data and fast response remediation to any non-compliant traffic flow or policy change to maintain the required security posture on a continuous basis. Observability provides evidential and visual proof that an organization’s security strategy is effective.
Paul German, CEO, Certes Networks, concludes: “Organizations need to start thinking differently about data security. The major challenge for a CISO is no longer the network, rather the data has to come first. With the launch of Certes Networks Provable Security™, we have a technology solution available today that allows CIOs and CISOs to visualize and understand their data, associated applications, workloads and behavior, with real-time contextual data. Organizations can now take actionable steps not only to measure the effectiveness of their security strategy but to gain deep insight into how to enhance their security posture and to manage and enforce policies.”