For the first-time enterprises can encrypt sensitive data, maintain operational agility and meet growing regulatory requirements

Certes Networks, an innovator in software-defined security solutions, yesterday announced the launch of its patented Stealth Encryption solution. By encrypting data at the transport layer of the network, Certes is allowing business to increase security without compromising infrastructure or business agility.

Certes has developed the industry’s first layer 4 encryption technology to secure data-in-motion, over any network, all without affecting network and application performance. Traditionally, network encryption solutions have worked at layers 2 and 3 of the network OSI Model and are often a function within a router, firewall or other network device. As a result, deploying encryption within the current encryption technology parameters can have a major impact on network and application performance, for example, encryption processing can cut firewall throughput by over 75%. The Certes solution alleviates this problem by decoupling encryption from the infrastructure to ensure consistent network and application performance.

[easy-tweet tweet=”Certes’ patented technology encrypts only the payload of the packet” hashtags=”Technology,Encryption”]

Additionally, by working at layer 4, Certes Stealth Encryption ensures that only the data payload is encrypted, not the entire packet. To date, encryption technologies have only been able to encrypt all of the packet. This leaves an organisation without visibility of its own network traffic, meaning when performance or configuration issues arise encryption solutions must be turned off to allow the problem to be identified and addressed.

Certes’ patented technology encrypts only the payload of the packet; a network using the solution can maintain complete visibility, functionality and all troubleshooting capabilities. Further to this, the stealth encryption element means any intruder looking for sensitive data within the network will not be able to identify encrypted packets versus non-encrypted packets easily, resulting in any stolen sensitive data being rendered useless.

As businesses look to meet growing regulatory requirements around consumer data protection, including PCI DSS, ISO standards and GDPR, many are adopting a zero-trust model. This approach, which dictates that nothing within the network is inherently trusted, is pointed to by analysts as the way to minimise the risk and impact of a data breach. Certes actively supports businesses moving to this model as its Stealth Encryption offers zero-trust with zero disruption, allowing CISOs to enforce security and policies to protect sensitive digital assets without impacting operations.

Paul German, CEO at Certes commented, “Encryption is a vital component of any cyber security strategy, as it allows businesses to comply with a growing number of standards surrounding data protection. Not only this, but it has the ability to render stolen data completely useless to hackers. However, traditional approaches that have hampered network functionality meaning many businesses are not making the most of the protection encryption technology can offer. Certes Stealth Encryption is enabling businesses for the first time to simultaneously maintain complete functionality  while protecting valuable data.”

 

+ posts

Marketing Manager for Compare the Cloud

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

How AI is Transforming Customer Communication Management

Business communication has evolved over the years. Today, it's...

Investment Opportunities for Startups and Technologies in AI 

Although artificial intelligence developed from niche technology has become...

Four Surprising Lessons I’ve Learned Leading Tech Teams

Techies. Geeks. Boffins. Whatever your organisation calls its IT...

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...