Certes CryptoFlow Net – Software Version.indd

DATASHEET
Certes CryptoFlow™ Net – Software Version
3RUWDEOH6RIWZDUH2QO\(QFU\SWRU
(DVLO\'HSOR\DEOHRQ2΍WKH6KHOI+DUGZDUH
ΖQWHURSHUDEOHZLWKRWKHU&U\SWR)ORZ(QFU\SWRUV
PRODUCT OVERVIEW
Easy to Deploy
Usage-based
Licensing
Simple Management
Total Control of Keys
and Policies
Fully Interoperable
About Certes
&HUWHV1HWZRUNVSURWHFWVGDWD
LQPRWLRQ7KHFRPSDQ\ȇV
DZDUGZLQQLQJ&U\SWR)ORZȠ
6ROXWLRQVVDIHJXDUGGDWD
WUDɝ
FLQSK\VLFDOYLUWXDODQG
&ORXGHQYLURQPHQWVHQDEOLQJ
VHFXUHFRQQHFWLYLW\RYHU
DQ\LQIUDVWUXFWXUHZLWKRXW
FRPSURPLVLQJQHWZRUNGHYLFH
RUDSSOLFDWLRQSHUIRUPDQFH
&RPSDQLHVDURXQGWKH
ZRUOGUHO\RQQHWZRUN
HQFU\SWLRQSURGXFWVIURP
&HUWHV1HWZRUNVWRSURWHFW
GDWDDFFHOHUDWHDSSOLFDWLRQ
GHSOR\PHQWVLPSOLI\QHWZRUN
SURMHFWVUHGXFHFRPSOLDQFH
FRVWVDQGLPSURYHWKHUHWXUQ
RQLQYHVWPHQWLQΖ7
LQIUDVWUXFWXUH
For more information visit
CertesNetworks.com
Contact Certes Networks
300 Corporate Center Drive, Suite 140
Pittsburgh, PA 15108 USA
Tel: +1 (888) 833-1142
Fax: +1 (412) 262-2574
CertesNetworks.com
Certes Networks’ CryptoFlow Net Enforcer – Software (CFNE-S) provides the ultimate ȵexibility for
protection of data in motion. The software version of Certes’ real-time traɝc encryptors can be
easily deployed on a third-party device
such as a server or gateway, providing
a wide range of deployment options for
protecting your sensitive data in motion.
The software encryptor is completely
interoperable with Certes’ other awardwinning network encryptors, including
the dedicated hardware appliance and
the virtualized encryptor.
BENEFITS
Easy to Deploy
■
Operates on commercial-o΍-the-shelf servers from Dell.
■
Deploy as many copies as needed to support the desired topology at no additional cost.
■
Can be installed on any 12th generation Dell Server.
Usage-based Licensing
■
■
Deploy as many instances at as many locations as you need.
Pay only for the traɝc you encrypt via CryptoFlows on the CFNE-S encryptors.
Simple Management
■
Fully centrally managed with CryptoFlow Net Creator, including troubleshooting,
maintenance and upgrades.
Total Control of Keys and Policies
■
Keying material and protection policies are completely controlled from CryptoFlow Net
Creator, the centralized policy and key management system.
Fully Interoperable
■ Works seamlessly with other hardware-based and virtualized CryptoFlow Net Enforcers.
PERFORMANCE
RECOMMENDED SYSTEM SPECIFICIATIONS
■
12th Generation Dell Appliance
■
Intel Xeon processor (with AES-NI)
■
Intel 1G NIC cards (with DPDK)
■
4GB RAM
■
500 GB Storage
Tested for full line rate 1Gbps bidirectional
encryption with AES-256-GCM encryption and
integrity protection algorithm with 512 Byte
packets. Testing performed on Dell R220 XEON
E3-1240L Intel I350-T2 with 8GB RAM and 500 GB
storage.
North America Sales
[email protected]
Asia-Pacific Sales
[email protected]
Government Sales
[email protected]
Central & Latin America Sales
[email protected]
Europe, Middle East
and Africa Sales
[email protected]
V1-05-11-2015