CryptoFlow Solutions Automate Role-Based Access Control to Protect Enterprise Applications on Any Apple, Windows or Android Device

November 30, 2015

3 Min Read

PRESS RELEASE

UK – November 24, 2015 – Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications, today announced the company’s award-winning CryptoFlow product suite offers automatically enforced role-based access control for users on any Apple, Windows or Android device.

Certes’ CryptoFlows are the industry’s first software-defined security solution for safeguarding enterprise applications over any network for any user on any device. They enable “frictionless enterprise” deployments of networked applications to be rolled out without increasing risk.

CryptoFlows block the top attack vector used in hacking attacks worldwide, the compromise of low-privilege users that gives hackers unfettered access to move laterally through enterprise IT resources to reach the most sensitive applications.

The product suite creates secure virtual overlays called CryptoFlows that protect enterprise applications end to end. CryptoFlow secure overlay can connect authorised users on any device to applications in a data centre, cloud, virtualised environment or distributed and hybrid deployment.

The security manager can set access control policies based on previously-defined users’ roles in the enterprise, perfectly aligning security with business objectives. The CryptoFlows automatically enforce consistent policies and access control for authorised users on smartphone, tablets and laptops running iOS, Android, Mac and Windows.

 

Benefits include:

• The ability to seamlessly secure applications for users on any network inside or outside the enterprise, including the LAN, WAN, Internet, cloud, WiFi, mobile and other networks.

• Protection and policies automatically enforced across siloes and require no changes to the network or applications. All control is in the hands of the security manager.

• Applications safely extended to external parties, including contractors, supply chain members, professional services firms and partner companies. If one of these external users is compromised, hackers are blocked from accessing the most sensitive applications.

• Touchless endpoint support means users never have to activate a VPN or client or use complex log-ins that waste time and lead users to adopt unauthorised “Shadow IT” applications.

• Automatic crypto-segmentation that isolates and protects applications when hackers get past the firewall. Certes CryptoFlows are infrastructure agnostic, enforcing security with standalone policy enforcers or as virtualised enforcement points in the Cloud or in enterprise data centres.

 

Press Release

Certes’ award-winning CryptoFlow security products are the centrepiece of Certes’ perfect 15-year track record of 7,300 product deployments in 84 countries without a single successful hack of any protected application.

“The data breach blind spot is that enterprise applications are only as safe as their least secure user, contractor or supply chain member,” said Satyam Tyagi, Certes Networks’ CTO. “CryptoFlows now can enforce role-based access control for users on any standard endpoint device, automatically protecting the most sensitive applications while blocking hackers from moving laterally to sensitive applications if a user is compromised.”

 

About Certes Networks

Certes Networks protects enterprise applications with market-leading software-defined security solutions. The company’s award-winning CryptoFlow® Solutions safeguard application traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network device or application performance. Companies around the world rely on security solutions from Certes Networks to protect access, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights