EU NATIONAL & U.S. FEDERAL GOVERNMENT
GOVERNMENT AGENCIES MOVE TO SD-WAN
Use Case
U.S. Federal and national government agencies turning to SD-WAN to modernize their wide-area network in order to make Zero Trust a best practice.
NCSC PRIME
.
Use Case
Certes Networks provides PRIME compliant technology and helps customers understand the NCSC PRIME guidance and to deploy network encryption using IPsec..
MINISTRY OF FOREIGN AFFAIRS
.
Use Case
Eastern European Ministry of Foreign Affairs protects essential network applications with Certes Layer 4 solution..
UK CYBER SECURITY STANDARDS
Tech Soundbite
Certes Networks helps public sector organisations in the UK migrate from Legacy MPLS to SDN and SD-WAN network architectures due to ever-evolving government cyber security standards.
CERTES PARTNERSHIP WITH EU COMMISSION
Tech Soundbite
Certes Networks announces its ongoing partnership with the European Commission as a trusted cybersecurity technology provider.
DHS RANSOMWARE ACT
Blog
A new law passed the U.S. Senate demands the federal government heighten its support for organizations hit by ransomware through the DHS Cyber Hunt and Incident Response Teams Act.
U.S. LOCAL & STATE AGENCIES
SMART CITIES
Use Case
When connectivity and innovation meet such large city infrastructures, they immediately become vulnerable to cyber threats from malicious actors waiting to bring all that hard work to a standstill.
USING CRYPTO-SEGMENTATION FOR DATA ASSURANCE
Use Case
There is a better way for State Governments and agencies to approach data security. Crypto-segmentation takes on the mission of the old-style router Access Control Lists (ACLs), but with an entirely new approach that allows government to quickly and easily divide physical networks into thousands of logical segments to create a reduced scope of trust per policy.
STATE JUDICIAL DEPARTMENT
Use Case
A U.S. State Judicial Department encrypts sensitive data and traffic between their courthouse and recovery site aimed at integrating state and federal resources into a single center.
U.S. LOCAL COUNTY
Use Case
Leading U.S. local county government agency chooses Certes Network FIPS 140-2 Certified encryption technology to meet CJIS data encryption requirements in order to pass CJIS audit.
CRIMINAL / LAW ENFORCEMENT
COUNTY SHERIFF'S OFFICE & CJIS COMPLIANCE
Use Case
Maryland County Sheriff’s office chooses Certes Networks to assist with data encryption mandate to comply with CJIS.
COLUMBIA COUNTY SHERIFF'S OFFICE & CJIS
Use Case
Columbia County Sheriff's Office chooses Certes Networks to encrypt their data using FIPS 140-2 certified technology at six locations to comply with the CJIS Security Policy.
LAW ENFORCEMENT & CJIS CHECKLIST
Tech Soundbite
Law Enforcement agencies must use data encryption to comply with CJIS regulations.
LAW ENFORCEMENT: TARGET FOR CYBER CRIMINALS
Technology Report
Law Enforcement is a highly-focused target for cyber criminals whose sole purpose is to exploit sensitive information and impact a region’s critical infrastructure and services.
LAW ENFORCEMENT: DHS IN CYBER SECURITY
Technology Report
Intelligence community works together with law enforcement to mitigate threats to U.S. cyber and communications systems.
UTILITIES & CRITICAL NATIONAL INFRASTRUCTURE (CNI)
NATIONAL OIL COMPANY
Use Case
A National Oil Company wanted visibility of their data as it traversed the network but had no secure key management system to automate easy key rotation nor the ability to define and deploy policies.
U.S. UTILITY COMPANY
Use Case
A U.S. diversified energy and utility company that operates in 23 states contacted Certes Networks for an encryption management solution.
COLLABORATION: GOVERNMENT & ICS
eBook
Critical infrastructure cybersecurity depends on strong encryption and collaboration between Government and ICS technology.
OIL & GAS: KEEPING DATA SECURE
Tech Soundbite
As published in Security Middle East, 2019 December, Business Chief Middle East, 2019 October and Professional Security Magazine, 2019 September: “Keeping Data Secure In the Oil & Gas Industry”.
UTILITIES: CAN CYBER-ATTACKS BE PREVENTED?
Tech Soundbite
As published in SC Magazine, September 2019. “How Can the Utilities Sector Prevent a Cyber-attack?”
CNI DEPENDS ON STRONG DATA ENCRYPTION
Blog
Increasingly, critical infrastructure relies on internet connect industrial control systems (ICS)….
BANKING & FINANCE
REGIONAL BANK VoIP ENCRYPTION
Use Case
Regional bank chooses Certes Networks to deploy group encryption to encrypt VoIP data between 250 locations over a converged MPLS backbone..
NATIONAL BANK VLAN-BASED ETHERNET ENCRYPTION
Use Case
Country's 7th largest bank with 586 branches nationwide chooses Certes Networks and uses VLAN-based Ethernet encryption to maintain network performance..
BANKS MOVE TOWARD SD-WAN TO IMPROVE EXPERIENCE
Tech Soundbite
As published in Finance Digest, January 2020. “How SD-WAN will help banks improve their branch communication and enrich the customer experience.”
BANKING ON SECURITY: KEEPING DATA SECURE
Tech Soundbite
As published in BCW Publisher News, August 2019 and Professional Security, October 2019. “Banking on Security: Keeping Data Secure in Financial Services.”
COMPLIANCE REGULATIONS
CJIS SECURITY POLICY
.
Compliance Brief
Learn more about the CJIS Security Policy requirements and mandates affecting any entity accessing the information provided by the CJIS database.
CALIFORNIA CONSUMER PRIVACY ACT (CCPA)
Compliance Brief
How the CCPA will impact organizations that conduct business in the State of California, or any business, regardless of location, that process data of a California resident.
NY SHIELD ACT
Compliance Brief
The Stop Hacks and Improve Electronic Data Security Handling (SHIELD) Act applies to any entity that processes the private information of residents of New York regardless of where that entity is located. Learn more by clicking below.
GDPR
Compliance Brief
Any enterprise that provides a service whereby personal data of a resident of the EU is processed will be impacted by GDPR requirements. Learn more by clicking below.
GDPR: Checking a Box Is Not Enough
Webinar
Certes Networks, in collaboration with BrightTALK, hosts the podcast-style webinar, "Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World" featuring Simon Hill, Director Compliance & Risk, Certes Networks.
NERC CIP
Compliance Brief
NERC's authority has led to critical infrastructure protection (CIP) standards that guide utilities' to mitigate internal and external security risks. The CIP standards have evolved focusing on both physical security measures and the integration of cybersecurity system technologies and applications.
PCI DSS COMPLIANCE
Compliance Brief
Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices and requirements for processing, transmission and storage of consumer credit card information.
CHALLENGES OF UK CYBER SECURITY STANDARDS
Tech Soundbite
United Kingdom National Cyber Security Centre (NCSC) has issued principles for cyber secure enterprise technology to organisations, including guidance on deploying and buying network encryption. Learn more by clicking below.
SD-WAN
SD-WAN AND NCSC PRIME
Use Case
Supporting the emergence of internet and SD-WAN supplier network solutions
GOVERNMENT AGENCIES MOVE TO SD-WAN
Use Case
U.S. Federal and national government agencies turning to SD-WAN to modernize their wide-area network in order to make Zero Trust a best practice.
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN
Use Case - Government
Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for government end-users.
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN
Use Case - High Assurance
Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for banking customers.
BANKS MOVE TOWARD SD-WAN TO IMPROVE EXPERIENCE
Tech Soundbite
As published in Finance Digest, January 2020. “How SD-WAN will help banks improve their branch communication and enrich the customer experience.”
SD-WAN PAVES THE WAY
Tech Soundbite
As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.
General
OBSERVABILITY VS VISIBILITY
Tech Soundbite
Understand how observability and visibility are different and why organizations often confuse the two. Both are equally important but serve very different purposes in protecting data as it crosses the network.
SD-WAN PAVES THE WAY
Blog
As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.
BUILDING A TRUSTWORTHY DIGITAL ECONOMY
Blog
For CEOs, the task is clear: Build a trustworthy digital economy that safeguards our future prosperity.
HOW LONG DOES IT TAKE TO CONTAIN A DATA BREACH?
Blog
Learn about the five most important steps necessary to contain a data breach. Is your organization prepared?
HAVE DATA BREACHES BECOME COMMON?
Blog
The year 2019 was a landmark year for data breaches experiencing over 3,800 breaches, which is a 50% greater increase over the last four years.
CERTES OBSERVABILITY
Webinar
Learn more about Certes Observability, providing real-time contextual meta-data that enables rapid detection of out-of-policy data and fast response and remediation to any non-compliant traffic flow or policy change. Certes Observability provides visual proof that your security strategy is effective.
PROTECT YOUR DATA VS THE NETWORK
Webinar
Webinar entitled, "Show Me the Money: What are Cybercriminals Really Seeking?" Brought to you by Certes Networks and BrightTALK. Learn more about how to protect your data from ransomware.
A technology solution that is simple, scalable and uncomplicated.
Contact Us
Want to learn more? One of our team members would be happy to help!