Certes Networks Launches Stealth Encryption

For the first-time enterprises can encrypt sensitive data, maintain operational agility and meet growing regulatory requirements

Certes Networks, an innovator in software-defined security solutions, yesterday announced the launch of its patented Stealth Encryption solution. By encrypting data at the transport layer of the network, Certes is allowing business to increase security without compromising infrastructure or business agility.

Certes has developed the industry’s first layer 4 encryption technology to secure data-in-motion, over any network, all without affecting network and application performance. Traditionally, network encryption solutions have worked at layers 2 and 3 of the network OSI Model and are often a function within a router, firewall or other network device. As a result, deploying encryption within the current encryption technology parameters can have a major impact on network and application performance, for example, encryption processing can cut firewall throughput by over 75%. The Certes solution alleviates this problem by decoupling encryption from the infrastructure to ensure consistent network and application performance.

[easy-tweet tweet=”Certes’ patented technology encrypts only the payload of the packet” hashtags=”Technology,Encryption”]

Additionally, by working at layer 4, Certes Stealth Encryption ensures that only the data payload is encrypted, not the entire packet. To date, encryption technologies have only been able to encrypt all of the packet. This leaves an organisation without visibility of its own network traffic, meaning when performance or configuration issues arise encryption solutions must be turned off to allow the problem to be identified and addressed.

Certes’ patented technology encrypts only the payload of the packet; a network using the solution can maintain complete visibility, functionality and all troubleshooting capabilities. Further to this, the stealth encryption element means any intruder looking for sensitive data within the network will not be able to identify encrypted packets versus non-encrypted packets easily, resulting in any stolen sensitive data being rendered useless.

As businesses look to meet growing regulatory requirements around consumer data protection, including PCI DSS, ISO standards and GDPR, many are adopting a zero-trust model. This approach, which dictates that nothing within the network is inherently trusted, is pointed to by analysts as the way to minimise the risk and impact of a data breach. Certes actively supports businesses moving to this model as its Stealth Encryption offers zero-trust with zero disruption, allowing CISOs to enforce security and policies to protect sensitive digital assets without impacting operations.

Paul German, CEO at Certes commented, “Encryption is a vital component of any cyber security strategy, as it allows businesses to comply with a growing number of standards surrounding data protection. Not only this, but it has the ability to render stolen data completely useless to hackers. However, traditional approaches that have hampered network functionality meaning many businesses are not making the most of the protection encryption technology can offer. Certes Stealth Encryption is enabling businesses for the first time to simultaneously maintain complete functionality  while protecting valuable data.”

 

+ posts

Meet Stella

Newsletter

Related articles

Shopping for Data: Ensuring a seamless user experience 

This combination can drive a business’s data culture and provide a structured approach for businesses to benefit from data intelligence across their operations, with only a few clicks.

Unveiling the Top 10 Cybersecurity Threats to Watch Out for in 2023

As technology advances, so do cybercriminals' methods to gain unauthorised access to sensitive information. With the increasing reliance on technology in both personal and professional settings, it is crucial to stay informed about the top cybersecurity threats to watch out for in 2023.

Is sustainability ‘enough’ from a Cloud perspective?

The idea of uprooting entire sustainability initiatives that took years to formulate and deploy is unsettling for businesses but, in truth, it doesn’t have to be so revolutionary.

Endpoint management: Common challenges and trends for 2023

The surge in remote work and the growing trend of using the same mobile devices for work and leisure have challenged traditional on-premise IT management

Cloud Vs On-Premise Server

Both cloud computing and an on-premise hardware server farm have their advantages and disadvantages, and the choice between them depends on the specific needs of the business and the application.

Subscribe to our Newsletter