Certes Networks Launches Stealth Encryption

For the first-time enterprises can encrypt sensitive data, maintain operational agility and meet growing regulatory requirements

Certes Networks, an innovator in software-defined security solutions, yesterday announced the launch of its patented Stealth Encryption solution. By encrypting data at the transport layer of the network, Certes is allowing business to increase security without compromising infrastructure or business agility.

Certes has developed the industry’s first layer 4 encryption technology to secure data-in-motion, over any network, all without affecting network and application performance. Traditionally, network encryption solutions have worked at layers 2 and 3 of the network OSI Model and are often a function within a router, firewall or other network device. As a result, deploying encryption within the current encryption technology parameters can have a major impact on network and application performance, for example, encryption processing can cut firewall throughput by over 75%. The Certes solution alleviates this problem by decoupling encryption from the infrastructure to ensure consistent network and application performance.

[easy-tweet tweet=”Certes’ patented technology encrypts only the payload of the packet” hashtags=”Technology,Encryption”]

Additionally, by working at layer 4, Certes Stealth Encryption ensures that only the data payload is encrypted, not the entire packet. To date, encryption technologies have only been able to encrypt all of the packet. This leaves an organisation without visibility of its own network traffic, meaning when performance or configuration issues arise encryption solutions must be turned off to allow the problem to be identified and addressed.

Certes’ patented technology encrypts only the payload of the packet; a network using the solution can maintain complete visibility, functionality and all troubleshooting capabilities. Further to this, the stealth encryption element means any intruder looking for sensitive data within the network will not be able to identify encrypted packets versus non-encrypted packets easily, resulting in any stolen sensitive data being rendered useless.

As businesses look to meet growing regulatory requirements around consumer data protection, including PCI DSS, ISO standards and GDPR, many are adopting a zero-trust model. This approach, which dictates that nothing within the network is inherently trusted, is pointed to by analysts as the way to minimise the risk and impact of a data breach. Certes actively supports businesses moving to this model as its Stealth Encryption offers zero-trust with zero disruption, allowing CISOs to enforce security and policies to protect sensitive digital assets without impacting operations.

Paul German, CEO at Certes commented, “Encryption is a vital component of any cyber security strategy, as it allows businesses to comply with a growing number of standards surrounding data protection. Not only this, but it has the ability to render stolen data completely useless to hackers. However, traditional approaches that have hampered network functionality meaning many businesses are not making the most of the protection encryption technology can offer. Certes Stealth Encryption is enabling businesses for the first time to simultaneously maintain complete functionality  while protecting valuable data.”


+ posts

Meet Disruptive Live!


Related articles

ChatGPT one year on: six paradigms that AI and LLMs have introduced for brands

The window for first-mover advantage is tiny. Soon, legions of different companies will become fluent in the new lexicon of LLMs and AI, using emerging platforms to create efficiencies, transform team performance, boost revenue and grow market share.

Remote connectivity: the linchpin in a sustainable future

The potential for remote connectivity to shape the future of work cannot be understated. By embracing solutions that offer this, businesses can foster a positive culture built on flexibility and productivity

Want to improve your cybersecurity posture?

The UK’s Cyber Security Breaches Survey released earlier this...

The three stages of AI in innovation

We’ve all heard a lot about AI recently, fuelled...

CIF Presents TWF – Cécile Rénier

In this tenth episode of our weekly news and...