solution note cryptoflow b2b

4
SOLUTIONS NOTE Certes CryptoFlow B2B Certes’ CryptoFlow Solutions offer seamless point-and- click security of data traffic for sensitive applications across any network. Now with CryptoFlow B2B, enterprises can safely extend applications to external business partners, supply chain members and contractors without opening a major attack vector to hackers. CryptoFlows are the industry’s first application-aware and user-aware solutions for protecting networked applications. CryptoFlows ensure safer collaboration, streamlined business processes and frictionless interaction with partners without raising risk of a major data breach of your most sensitive data. 3 Safely Extend Apps to External Partners 3 Collaboration for Frictionless Business 3 Sensitive Apps Protected if Partner is Compromised 3 Blocks #1 Attack Vector 3 App Access Controlled by Partner-Role

Upload: jim-meulemans

Post on 13-Nov-2015

37 views

Category:

Documents


3 download

DESCRIPTION

Cipher Networks is an Authorized Value Added Reseller for Certes Network Products. You can contact CipherWire with the contact details below.CipherWire Networks - http://cipherwire.net/Tel#: 866-421-9522 | Email: [email protected] Person:Jim MeulemansTel#: 434-534-6989Email:[email protected]

TRANSCRIPT

  • SOLUTIONS NOTE

    Certes CryptoFlow B2B

    Certes CryptoFlow Solutions offer seamless point-and-click security of data traffic for sensitive applications across any network.

    Now with CryptoFlow B2B, enterprises can safely extend applications to external business partners, supply chain members and contractors without opening a major attack vector to hackers.

    CryptoFlows are the industrys first application-aware and user-aware solutions for protecting networked applications. CryptoFlows ensure safer collaboration, streamlined business processes and frictionless interaction with partners without raising risk of a major data breach of your most sensitive data.

    3 Safely Extend Apps to External Partners

    3 Collaboration for Frictionless Business

    3 Sensitive Apps Protected if Partner is Compromised

    3 Blocks #1 Attack Vector

    3 App Access Controlled by Partner-Role

  • | page 2 | 2015 Certes Networks. All rights reserved.

    CryptoFlow B2B extends any networked application to external partners and automatically enforces cryptographically protected access to only the applications they need based on their roles.

    With traditional security architectures, you are only as safe as your partners. Thats because a perimeter-based security model focuses on granting access through the firewall for the external contractors and partners. But if a partners network is breached or credentials are compromised by a phishing or other attack, the hackers gain the same unfettered access to your internal systems.

    CryptoFlow B2B harnesses the application-aware and user-aware power of CryptoFlows to protect shared applications and reduces the attack risk of extending access to partners.

    CryptoFlow B2B enables you to protect each individual app, granting access to only authorized partners. Protection is end-to-end, from data center or Cloud to the authorized external user and their registered devices.

    CryptoFlow B2B: Safer Partner Collaboration, Streamlined Processes for Frictionless Business

    3 Secure policy defined virtual overlay sharing only those applications and with only those partners authorized to use them.

    3 Partners and contractors can access only the apps and systems you specify.

    3 Partner enrollment for application access integrated with your existing LDAP directories.

    3 If a partner is breached or compromised, attacker cannot gain access to any other systems or apps.

    3 Strong 256-bit AES-GCM crypto-segmentation activated by simple point-and-click policy creation and management.

    3 Supports laptops, desktops, smartphones and tablets including personal devices.

    3 No impact on performance of applications or networks. Supports all standards-based networks including Internet.

    3 No risk of user error or policy violation. Once a device is registered with the CryptoFlow, protection is automatic and seamless.

    CryptoFlows end the messy hodgepodge of hard-to-manage encryption technologies, fragmented across network hops, layers and applications and eliminates the reliance on traditional network segmentation which was designed for routing and not security. Instead, you have a single, auditable point of control to protect critical data from application to user, over LAN, WAN, Wireless, Internet or any other network inside or outside. You are no longer dependent on firewalls or routers that are cut to a quarter of their performance level when encryption is turned on.

    Thousands of CryptoFlow units are in service today in 70 countries around the world protecting the most sensitive data traffic for financial institutions, healthcare networks, governments, multinationals and many others.

    CryptoFlow OverviewCryptoFlow Solutions consist of Certes award-winning physical and virtual CryptoFlow Enforcers deployed seamlessly in your data center, network, remote sites and elsewhere. No network configuration or application configuration is required. CryptoFlow VPNs are set up using Certes award-winning CryptoFlow Creator Management System. Once the desired topology is configured, the management system automatically pushes the required policies to Enforcers, activating the cryptographic policy enforcement in the form of CryptoFlows. Encryption keys and security policies are centrally managed and controlled entirely by you.

  • 2015 Certes Networks. All rights reserved. | page 3 |

    Capabilities & Features 3 Segregation with Encryption: Standards-based 256-bit AES-GCM to segregate sensitive data and applications across networks

    3 Decoupled Security: no changes required to networks or applications. Supports all standard LAN and WAN technologies

    3 Physical & Virtual: Enforcers are hardware-based appliances or virtual machines installed on any supporting system

    3 Single point of control: Centralized control of keys and encryption policies, with point-and-click simplicity

    3 Simple Set-up: Enforcers can be installed in minutes

    3 Transparent Secure Failover: No impact to load balancing, High Availability or disaster recovery designs

    3 Infrastructure Neutral: Compatible with all underlying networking gear, regardless of vendor

    LAN/WAN/INTERNET

    crm

    Enterprise ApplicationEncryption ProfileUser Groups

    Sales

    Execs

    CryptoFlow Engine

    crm

    crm

    SECRET

    CONFIDENT

    IAL

    yptoFlow EngyptoFlow EnEEwwwwooFFoopp ngngnn

    CryptoFlowencryptor

    CryptoFlowencryptor

    CryptoFlowencryptor

    CryptoFlowMobile AgentCryptoFCryptoFoopprrCCCCrCCr FlowFlowowowFFoFlFFFoFFlFFloFloFl

    bil AiMM ttAAypyppp

  • Find out how Certes CryptoFlow Solutions will revolutionize how you secure data in motion. Visit CertesNetworks.com

    Global Headquarters300 Corporate Center Drive, Suite 140

    Pittsburgh, PA 15108Tel: +1 (888) 833-1142Fax: +1 (412) 262-2574CertesNetworks.com

    North America [email protected]

    Government [email protected]

    Asia-Pacific [email protected]

    Central & Latin America [email protected]

    Europe, Middle East and Africa Sales

    [email protected]

    V1-04-08-2015