Provable Security

THE FIVE PILLARS OF CERTES NETWORKS PROVABLE SECURITY

Certes Networks Provable Security™ is supported and interconnected by the Certes Five Pillars.  Each pillar is a key performance indicator (KPI) that measures the value that the security strategy delivers to an organization as a whole.

Certes Layer 4 Solution delivers on these KPIs and is able to quantify security’s role to build, modify and measure a security strategy that aligns and protects the needs of the organization while mitigating risk.

Policy Enforcement

Only as good as the policy defined

Crypto-segmentation

Policies as granular as you need them to be

Scalability

Implementation that is network agnostic

Visibility

Encrypt data in transit and maintain network visibility and functionality

Observability

Real-time, visual proof that your security strategy is effective

PILLAR ONE: POLICY ENFORCEMENT

IT BEGINS WITH POLICY ENFORCEMENT

Certes Networks Provable Security™ is based on the Certes Five Pillars or KPIs beginning with Pillar One, Policy Enforcement. Provable security starts with the premise that policy enforcement is only as good as the policy defined and how that policy is enforced. While threats and vulnerabilities are virtually infinite, access to data is defined and is therefore finite and measurable. By enabling policy and enforcing that policy at a highly granular level, risk can be eliminated and data security can be quantified, measured and outcomes driven. Certes Networks Provable Security provides evidence that your security strategy is effective.

PILLAR TWO: CRYPTO-SEGMENTATION

POLICIES AS GRANULAR AS YOU NEED THEM TO BE

Certes Networks Provable Security™ is based on the Certes Five Pillars or KPIs. Pillar Two, Crypto-segmentation, removes the implicit trust we traditionally place in our network and creates a reduced scope of trust per policy, protected by encryption, to securely separate data flows between applications and workloads as defined by fine-grained policies. This security control is simple to deploy, however it increases the complexity involved for any attacker trying to exploit a network over which targeted data flows. This is a quantifiable and measurable metric. Certes Networks Provable Security provides evidence that your security strategy is effective.

PILLAR THREE: SCALABILITY

SCALABLE IMPLEMENTATION THAT IS NETWORK AGNOSTIC

Certes Networks Provable Security™ is based on the Certes Five Pillars or KPIs. Pillar Three, Scalability, refers to the Certes Layer 4 solution, a simple and scalable, end-to-end encryption management solution that is network agnostic easily integrating into any network infrastructure, fully interoperable with the existing security stack with zero impact to performance. Certes Networks offers the ability to support multiple deployments across a multi-vendor environment on any network or transport. With Certes Layer 4 technology, a customer can be sure that their data assurance posture will scale to support the depth and breadth of a customer’s environment, whether deployed top-of-rack, in a virtual environment, between data centers and applications (east to west) or simply just across the WAN or SD-WAN. Certes Networks Provable Security provides evidence that your security strategy is effective.

PILLAR FOUR: VISIBILITY

MAINTAIN NETWORK VISIBILITY AND OPERATIONAL FUNCTIONALITY

Certes Networks Provable Security™ is based on the Certes Five Pillars or KPIs and Pillar Four is Visibility. The Certes Layer 4 solution encrypts data in transit allowing for secure encryption of only the payload enabling transparent deployment that operates independently of applications and the underlying network with zero changes to routers, switches and firewalls. Network visibility and operational functionality are thereby fully maintained with zero impact to performance. This leads us to the final Pillar, Observability, which is the most critical KPI in order to quantify and measure whether a security strategy is effective.