Certes CryptoFlow™ B2B

SOLUTIONS NOTE
Certes CryptoFlow™ B2B
3 Safely Extend Apps to
External Partners
3 Sensitive Apps Protected if
Partner is Compromised
3 Collaboration for
Frictionless Business
3 Blocks #1 Attack Vector
Certes’ CryptoFlow Solutions offer seamless point-andclick security of data traffic for sensitive applications
across any network.
Now with CryptoFlow B2B, enterprises can safely extend
applications to external business partners, supply chain
members and contractors without opening a major
attack vector to hackers.
3 App Access Controlled by
Partner-Role
CryptoFlows are the industry’s first application-aware
and user-aware solutions for protecting networked
applications. CryptoFlows ensure safer collaboration,
streamlined business processes and frictionless
interaction with partners without raising risk of a major
data breach of your most sensitive data.
CryptoFlow B2B extends any networked application to external partners and automatically enforces
cryptographically protected access to only the applications they need based on their roles.
With traditional security architectures, you are only as safe as your partners. That’s because a perimeter-based
security model focuses on granting access through the firewall for the external contractors and partners. But if a
partner’s network is breached or credentials are compromised by a phishing or other attack, the hackers gain the
same unfettered access to your internal systems.
CryptoFlow B2B harnesses the application-aware and user-aware power of CryptoFlows to protect shared
applications and reduces the attack risk of extending access to partners.
CryptoFlow B2B enables you to protect each individual app, granting access to only authorized partners. Protection
is end-to-end, from data center or Cloud to the authorized external user and their registered devices.
CryptoFlow B2B: Safer Partner Collaboration, Streamlined Processes for Frictionless Business
3 Secure policy defined virtual overlay sharing only those applications and with only those partners authorized
to use them.
3 Partners and contractors can access only the apps and systems you specify.
3 Partner enrollment for application access integrated with your existing LDAP directories.
3 If a partner is breached or compromised, attacker cannot gain access to any other systems or apps.
3 Strong 256-bit AES-GCM crypto-segmentation activated by simple point-and-click policy creation
and management.
3 Supports laptops, desktops, smartphones and tablets including personal devices.
3 No impact on performance of applications or networks. Supports all standards-based networks
including Internet.
3 No risk of user error or policy violation. Once a device is registered with the CryptoFlow, protection is
automatic and seamless.
CryptoFlows end the messy hodgepodge of hard-to-manage encryption technologies, fragmented across network
hops, layers and applications and eliminates the reliance on traditional network segmentation which was designed
for routing and not security. Instead, you have a single, auditable point of control to protect critical data from
application to user, over LAN, WAN, Wireless, Internet or any other network inside or outside. You are no longer
dependent on firewalls or routers that are cut to a quarter of their performance level when encryption is turned on.
Thousands of CryptoFlow units are in service today in 70 countries around the world protecting the most sensitive
data traffic for financial institutions, healthcare networks, governments, multinationals and many others.
CryptoFlow Overview
CryptoFlow Solutions consist of Certes’ award-winning physical and virtual CryptoFlow Enforcers deployed seamlessly
in your data center, network, remote sites and elsewhere. No network configuration or application configuration is
required. CryptoFlow VPNs are set up using Certes’ award-winning CryptoFlow Creator Management System. Once
the desired topology is configured, the management system automatically pushes the required policies to Enforcers,
activating the cryptographic policy enforcement in the form of CryptoFlows. Encryption keys and security policies
are centrally managed and controlled entirely by you.
|
PAGE
2 |
©2015 Certes Networks. All rights reserved.
User Groups
Encryption Profile
Enterprise Application
FUP
ET
SECR
Sales
IAL
IDENT
CONF
Execs
CryptoFlow
yptoFlow
p oF ow EEng
Engine
Enng
n
CryptoFlow
encryptor
FUP
LAN/WAN/INTERNET
FUP
CryptoFlow
CryptoF
C
rypp oF
oFlo
oFl
FFlow
Fl
lo
low
M
bili A
Mobile
Agentt
CryptoFlow
encryptor
CryptoFlow
encryptor
Capabilities & Features
3
3
3
3
Segregation with Encryption: Standards-based
256-bit AES-GCM to segregate sensitive data and
applications across networks
3
Simple Set-up: Enforcers can be installed in minutes
3
Transparent Secure Failover: No impact to
3
Infrastructure Neutral: Compatible with all
Decoupled Security: no changes required to
networks or applications. Supports all standard
LAN and WAN technologies
Physical & Virtual: Enforcers are hardware-based
load balancing, High Availability or disaster
recovery designs
underlying networking gear, regardless of vendor
appliances or virtual machines installed on any
supporting system
Single point of control: Centralized control of
keys and encryption policies, with point-and-click
simplicity
©2015 Certes Networks. All rights reserved.
|
PAGE
3 |
Find out how Certes CryptoFlow Solutions will revolutionize how you secure data in motion.
Visit CertesNetworks.com
Global Headquarters
300 Corporate Center Drive, Suite 140
Pittsburgh, PA 15108
Tel: +1 (888) 833-1142
Fax: +1 (412) 262-2574
CertesNetworks.com
North America Sales
[email protected]
Asia-Pacific Sales
[email protected]
Government Sales
[email protected]
Central & Latin America Sales
[email protected]
Europe, Middle East
and Africa Sales
[email protected]
V1-04-08-2015