Certes Networks Logo

Protect mission-critical data moving on any network without cutting capacity or creating management headaches.

Certes provides CryptoFlow VPNs that utilize network-layer and application-layer encryptors that protect networked applications in the LAN, WAN, in data centers, the Internet, the Cloud … in any networked domain, physical or virtual.

CryptoFlow App secures applications end-to-end, from an app server in your data center or Cloud to an end-point device based on user access rights.

CryptoFlow Net secures network segments and links. It includes the Certes Enforcement Point (CEP) appliances, from CEP-5 (5 Mbps) to CEP-10G (10 Gbps) and the Virtual Certes Enforcement Point (vCEP), a fully virtualized version of the encryptor.

Request a Demo

Certes offers products to meet the highest standards for security and usability with:

  • AES-256 encryption
  • Group keying and custom key derivation
  • SHA-512 with persistent traffic integrity by frame or packet
  • Performance from 6 Mbps to 10 Gbps

Certes Enforcement Point

Unique variable speed data encryption appliances that match encryption throughput to your bandwidth needs.

Certes Enforcement Point

CryptoFlow Management Solutions

Flow-through Encryption Policy & Key Management

CryptoFlow Management Solutions

Virtual Certes Enforcement Point

The industry’s first virtual encryptor that protects enterprise data traffic in Cloud and virtual environments.

Virtual Certes Enforcement Point

Certes CryptoFlow™ Net Overview

CryptoFlow® Net Solutions enable you to set automatic traffic protection policies on any standards-based network, including LAN, WAN, WiFi, Internet, SDN/NFV and others.

Certes CryptoFlow™ Net Overview

Certes CryptoFlow™ Net – Software Version

Certes Networks’ CryptoFlow Net Enforcer – Software (CFNE-S) provides the ultimate flexibility for protection of data in motion.

Certes CryptoFlow™ Net – Software Version

 
 
 

Certes’ patented CryptoFlow® group VPNs provide software-defined, end-to-end traffic protection, application encryption, simple policy management, and powerful key controls, all without compromising network or application performance.

Instead of trying to plug holes in rigid borders with legacy products, Certes’ customers enjoy fluid, dynamic security that “follows” applications and enterprise assets, even into virtual and Cloud environments.

scroll-logo-1scroll-logo-7scroll-logo-3scroll-logo-4scroll-logo-6scroll-logo-5scroll-logo-2ITEXPO-BOS-2014-Vegas_webreadyvendorexcellencelogo-370x229

Data Protection You Can Trust

Our network security solutions utilize standards-based security protocols

  • AES 256 – The highest level of non-classified encryption
  • SHA-512 – Provides per frame and per packet traffic integrity
  • IPsec – The industry standard protocol for data in motion encryption
  • FIPS 140-2 – Government driven validation
  • Common Criteria EAL4+ Certified

The Performance You Demand

Our encryption solutions run at the maximum line rate for all packet sizes and link speeds

  • No other network security solution can outperform our line-rate encryption appliance. Not one.
  • Our Variable Speed Encryptors (VSEs) allow you to encrypt at your link speed, not one determined by a security vendor.
  • Our powerful CryptoFlow Net Creator policy management system advances VPN definition and set up to drag-and-drop, point-and-click simplicity, cutting hours of error-ridden tunnel configuration.

The Flexibility You Need

We allow you to encrypt without changing your network or applications

  • Only Certes Networks can encrypt at Layer 2, Layer 3 and Layer 4 with a single solution, including Ethernet encryption and IP encryption.
  • Only Certes Networks provide end-to-end protection for traffic – supporting Cloud securityWAN security, LAN security, extended enterprise security – all from a single interface and control point
  • We allow you to encrypt any network topology without creating point-to-point tunnels.
  • We preserve all headers, making encryption transparent to all network rules, services, and data flows.

Lowest Cost

We offer the lowest Total Cost of Ownership (TCO) of any encryption solution

  • Our Variable Speed Encryption Appliances and “No Penalty Upgrade Program” means your security solution scales seamlessly as your needs increase.
  • Our easy to install and simple to manage group encryption solution has 3x -5x TCO advantage over traditional IPsec VPN solutions.
  • Our performance advantage allows you to get the best performance from your network while achieving the highest level of security.
**Gartner, Hype Cycle for Enterprise Mobile Security, Dionisio Zumerle and John Girard, 22 July 2015; Gartner, Hype Cycle for Cloud Security, Jay Heiser, 17 July 2015; Gartner, Hype Cycle for Virtualization, Philip Dawson and Nathan Hill, 8 July 2015; Gartner, Hype Cycle for Enterprise Mobile Software and Services, Nick Jones, 21 July 2015.
JSN Epic template designed by JoomlaShine.com