SOLUTIONS NOTE Certes CryptoFlow™ B2B 3 Safely Extend Apps to External Partners 3 Sensitive Apps Protected if Partner is Compromised 3 Collaboration for Frictionless Business 3 Blocks #1 Attack Vector Certes’ CryptoFlow Solutions offer seamless point-andclick security of data traffic for sensitive applications across any network. Now with CryptoFlow B2B, enterprises can safely extend applications to external business partners, supply chain members and contractors without opening a major attack vector to hackers. 3 App Access Controlled by Partner-Role CryptoFlows are the industry’s first application-aware and user-aware solutions for protecting networked applications. CryptoFlows ensure safer collaboration, streamlined business processes and frictionless interaction with partners without raising risk of a major data breach of your most sensitive data. CryptoFlow B2B extends any networked application to external partners and automatically enforces cryptographically protected access to only the applications they need based on their roles. With traditional security architectures, you are only as safe as your partners. That’s because a perimeter-based security model focuses on granting access through the firewall for the external contractors and partners. But if a partner’s network is breached or credentials are compromised by a phishing or other attack, the hackers gain the same unfettered access to your internal systems. CryptoFlow B2B harnesses the application-aware and user-aware power of CryptoFlows to protect shared applications and reduces the attack risk of extending access to partners. CryptoFlow B2B enables you to protect each individual app, granting access to only authorized partners. Protection is end-to-end, from data center or Cloud to the authorized external user and their registered devices. CryptoFlow B2B: Safer Partner Collaboration, Streamlined Processes for Frictionless Business 3 Secure policy defined virtual overlay sharing only those applications and with only those partners authorized to use them. 3 Partners and contractors can access only the apps and systems you specify. 3 Partner enrollment for application access integrated with your existing LDAP directories. 3 If a partner is breached or compromised, attacker cannot gain access to any other systems or apps. 3 Strong 256-bit AES-GCM crypto-segmentation activated by simple point-and-click policy creation and management. 3 Supports laptops, desktops, smartphones and tablets including personal devices. 3 No impact on performance of applications or networks. Supports all standards-based networks including Internet. 3 No risk of user error or policy violation. Once a device is registered with the CryptoFlow, protection is automatic and seamless. CryptoFlows end the messy hodgepodge of hard-to-manage encryption technologies, fragmented across network hops, layers and applications and eliminates the reliance on traditional network segmentation which was designed for routing and not security. Instead, you have a single, auditable point of control to protect critical data from application to user, over LAN, WAN, Wireless, Internet or any other network inside or outside. You are no longer dependent on firewalls or routers that are cut to a quarter of their performance level when encryption is turned on. Thousands of CryptoFlow units are in service today in 70 countries around the world protecting the most sensitive data traffic for financial institutions, healthcare networks, governments, multinationals and many others. CryptoFlow Overview CryptoFlow Solutions consist of Certes’ award-winning physical and virtual CryptoFlow Enforcers deployed seamlessly in your data center, network, remote sites and elsewhere. No network configuration or application configuration is required. CryptoFlow VPNs are set up using Certes’ award-winning CryptoFlow Creator Management System. Once the desired topology is configured, the management system automatically pushes the required policies to Enforcers, activating the cryptographic policy enforcement in the form of CryptoFlows. Encryption keys and security policies are centrally managed and controlled entirely by you. | PAGE 2 | ©2015 Certes Networks. All rights reserved. User Groups Encryption Profile Enterprise Application FUP ET SECR Sales IAL IDENT CONF Execs CryptoFlow yptoFlow p oF ow EEng Engine Enng n CryptoFlow encryptor FUP LAN/WAN/INTERNET FUP CryptoFlow CryptoF C rypp oF oFlo oFl FFlow Fl lo low M bili A Mobile Agentt CryptoFlow encryptor CryptoFlow encryptor Capabilities & Features 3 3 3 3 Segregation with Encryption: Standards-based 256-bit AES-GCM to segregate sensitive data and applications across networks 3 Simple Set-up: Enforcers can be installed in minutes 3 Transparent Secure Failover: No impact to 3 Infrastructure Neutral: Compatible with all Decoupled Security: no changes required to networks or applications. Supports all standard LAN and WAN technologies Physical & Virtual: Enforcers are hardware-based load balancing, High Availability or disaster recovery designs underlying networking gear, regardless of vendor appliances or virtual machines installed on any supporting system Single point of control: Centralized control of keys and encryption policies, with point-and-click simplicity ©2015 Certes Networks. All rights reserved. | PAGE 3 | Find out how Certes CryptoFlow Solutions will revolutionize how you secure data in motion. Visit CertesNetworks.com Global Headquarters 300 Corporate Center Drive, Suite 140 Pittsburgh, PA 15108 Tel: +1 (888) 833-1142 Fax: +1 (412) 262-2574 CertesNetworks.com North America Sales [email protected] Asia-Pacific Sales [email protected] Government Sales [email protected] Central & Latin America Sales [email protected] Europe, Middle East and Africa Sales [email protected] V1-04-08-2015
© Copyright 2024