- All
- Blog
- Compliance Brief
- Infographic
- Tech Report
- Tech Soundbite
- Use Case
- Video
- Webinar
- Whitepaper
Blog
Trust but Verify: Strengthening AI Security with Data Protection
Research reveals an alarming vulnerability in AI systems, and their susceptibility to jailbreaking, highlighting the need to secure the data that underpins AI.
Infographic
Cyber Insights on Ransomware 2024
As cybercriminals become more sophisticated, the frequency and severity of ransomware attacks have escalated, placing businesses of all sizes at significant risk. Our latest infographic looks back over ransomware incidents in 2024, offering valuable insights into the scale and impact of the ransomware threat.
Tech Soundbite
AirGap & Certes DPRM
This whitepaper outlines the importance of safeguarding data in transit, explains how it fits into the broader objectives of DORA, and offers practical strategies for financial institutions to ensure compliance. With a focus on technologies like Certes DPRM, this paper highlights how organizations can secure their data flows, mitigate third-party risks, and build a more resilient digital infrastructure.
Whitepaper
Ensuring Operational Resilience: A Guide to Securing Data in Transit for DORA Compliance
This whitepaper outlines the importance of safeguarding data in transit, explains how it fits into the broader objectives of DORA, and offers practical strategies for financial institutions to ensure compliance. With a focus on technologies like Certes DPRM, this paper highlights how organizations can secure their data flows, mitigate third-party risks, and build a more resilient digital infrastructure.
Compliance Brief
Breaking the Killchain
Certes provides a comprehensive approach to Active Directory protection, focusing on disrupting the ransomware "Kill Chain" at its most vulnerable point: privilege escalation and lateral movement. Data Protection and Risk Mitigation (DPRM) separates data access from network access, preventing lateral movement within the network and using quantum cryptography to secure sensitive information.
Blog
The Importance of Protecting Active Directory from Attack: What’s at Stake?
In this blog post, we will discuss the importance of protecting Active Directory from cyberattacks, the devastating consequences of an AD breach, and best practices to safeguard this critical component of your IT infrastructure. Certes DPRM has a proven deployed solution that protects Active Directory from the potential attacks defined in this article.
Blog
Achieving DORA Compliance: Best Practices for Securing Data in Transit
Among the many aspects of digital resilience that DORA addresses, protecting data in transit plays a critical role in ensuring compliance with this regulation. In this blog post, we will explore why safeguarding data in transit is essential under DORA and how it helps businesses meet compliance requirements while protecting sensitive financial information.
Blog
Why Protecting Data in Transit Should Be Your Top Priority – Not Just Monitoring Network Activity
While monitoring network activity is important, it’s not enough on its own. One of the most overlooked but critical aspects of security is protecting data in transit — the data that moves between devices, networks, or cloud services. In this blog post, we’ll explain why focusing on securing data in transit is essential and how it can protect your business from sophisticated cyber threats.
Compliance Brief
PCI DSS COMPLIANCE
Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices and requirements for processing, transmission and storage of consumer credit card information.
Checklist
NIS2 Compliance Checklist
The NIS2 Directive from the EU brings new requirements for businesses to boost cybersecurity, conduct regular audits, and quickly report incidents. These rules are mandatory for organisations offering essential services, but they’re also important for anyone wanting to work with those organisations. We’ve put together a checklist on how you can get your business ready
Blog
Breaking the Kill Chain: How DPRM Prevents Active Directory Breaches Before They Happen
Active Directory (AD) exploitation is a priority target for ransomware attacks, with an estimated 70-80% of large-scale ransomware incidents involving AD manipulation. We explore why organisations need to adopt a new approach to protecting their systems. By breaking the kill chain, we can stop attacks in their tracks – protecting the data rather than relying solely on network-based defenses.
Video
Best Practices for Defensible Architecture
Be Secure First, Compliant Second: How do you protect your critical data when all your controls fail? Simon Hill, VP North America, Certes and Mike Meason, VP Information & Security, Western Farmers Electric continue their discussion regarding the importance of preparation, security and defensive strategies for any utilities business, focussing on being secure first, before seeking compliance.
Video
Network Encryption & Segmentation vs Data Protection & Segmentation
Simon Hill, VP North America, Certes and Mike Meason, VP Information & Security, Western Farmers Electric discuss how to prepare and secure your utilities business should a cyber attack occur; developing capabilities that give you a defensive advantage.
Blog
Rethinking Cybersecurity in Critical Infrastructure
The energy sector remains a prime target for cyber attackers seeking to disrupt global economies. Recent examples, such as the Halliburton incident, highlight how criminals can exploit vulnerabilities that persist in systems, like Active Directory (AD) – underscoring the urgent need for a shift in how we approach cybersecurity for critical infrastructure.
Whitepaper
Breaching the Energy Sector: Protecting Critical Infrastructure Against Advanced Cyber Exploits
Sophisticated attacks like those on Halliburton show that organizations can no longer solely rely on perimeter-based security. A proactive, multi-layered defense is essential to thwart these evolving threats. DPRM can serve as a proactive defense mechanism, limiting attackers’ ability to exploit vulnerabilities like ZeroLogon, thereby ensuring the integrity and security of your organization’s critical assets.
Video
Decrypting Zero Trust: Separating Fact from Fiction in Data Security
As cyber threats evolve, traditional security measures are falling short. Paul German CEO and Simon Pamplin CTO discuss why adopting a Zero Trust model is crucial for modern data protection. From dispelling myths to offering actionable steps, this episode provides valuable insights for organisations looking to safeguard their data.
Video
The Critical Role of the C-Suite in Data Protection
From GDPR to PCI compliance, regulatory bodies are tightening their grip, holding C-suite executives personally accountable for data breaches. With fines reaching millions and the spectre of potential imprisonment, the stakes have never been higher for both data protection and risk mitigation strategies.
Video
Beyond the Perimeter: Uncovering the True Essence of Data Protection
We kick off the conversation by highlighting the critical importance of safeguarding data itself, irrespective of the infrastructure it traverses. Ensuring control and protection of your data, regardless of how it moves across landscapes is paramount. We hear about Certes' unique approach to securing true data protection, empowering organisations to protect data from theft or misuse, regardless of infrastructure and emphasis on why businesses need to explore cybersecurity processes beyond network security.
Compliance Brief
CN Anti-Exfiltration Solution
HCI Server to Secure Cloud Backup over the internet – The Backup application currently protects data in transit via TLS. TLS is initiated via a handshake protocol which is where most of its vulnerabilities occur. TLS has known vulnerabilities that include malware injection and ‘Man in the Middle’ data exfiltration attacks. Once compromised the anti-ransomware
Blog
Monthly Insights on Ransomware Trends and Statistics
Our latest infographic, "Cyber Insights on Ransomware" infographic sheds light on the current landscape of ransomware threats in Q2, offering valuable data on the scope and impact of these attacks.
Blog
NIS2 Compliance: What You Need to Know and Why It Matters
This updated directive, set to be implemented on 17th October 2024, is designed to address the dynamic and evolving nature of cyber threats, ensuring that Europe’s critical infrastructure remains resilient and secure in the face of an increasingly hostile digital landscape. We outline the key changes to the NIS Directive, how your organisation can achieve
Compliance Brief
DORA Regulation Update
The Digital Operational Resilience Act (DORA) Regulation (EU) 2022/2554, effective January 17, 2025, sets rules for protecting against cyber breaches, including risk management, incident reporting, resilience testing, and third-party monitoring, with severe penalties for non-compliance, and may hold managers accountable for inadequate mitigation measures.
Compliance Brief
NIS Directive 2
The NIS Directive 2, effective October 17, 2024, aims to enhance EU cyber-resilience, reduce inconsistencies, and improve situational awareness, covering sectors including 5G, with strict incident response measures, reporting protocols, and significant sanctions, excluding entities involved in defence, national security, and other specified areas.
Blog
Protecting Against ShinyHunters: Advanced Cyber Threats and DPRM Solutions
Cyber threats in data-rich industries are growing. A breach affecting 30 million at a financial firm by ShinyHunters highlights the need for robust Data Protection and Risk Management solutions.
Blog
Dive into Certes’ New Podcast Series: Once More into the Breach
In an era where data breaches and cyber threats loom large, safeguarding sensitive information has never been more critical. Recognising the pressing need for organisations to fortify their defences, Certes proudly presents its latest venture: the launch of its new podcast series, “Once More into the Breach.”
Blog
Stay Ahead of Cyber Threats: Monthly Insights on Ransomware Trends and Statistics
Our latest infographic, "Cyber Insights on Ransomware," offers a detailed look at the current landscape of ransomware, highlighting key statistics and trends hitting 2024.
Webinar
Going on the Offensive: Tackling Volt Typhoon Attacks Webinar
Simon Hill, VP North America and Lorilee Ressler, Solutions Architect provide an overview of the rising IT attacks on critical infrastructure operators and how Volt Typhoon continues to compromise systems all over the globe. They present the use case for how Typhoon attacks can be addressed and prevented as well as an overview on how
Whitepaper
Addressing the Critical Threat of ShinyHunters: How DPRM Can Protect Against Advanced Cyber Attacks
The recent breach hitting a leading financial services company, affecting 30 million individuals, underscores the critical threat posed by sophisticated hacking groups such as ShinyHunters. This attack, part of a worrying trend, highlights the increased targeting of the financial services sector, which holds vast amounts of sensitive data. The hacker’s newsworthy breaches are a stark
Whitepaper
Hope Is Not A Strategy: Rethinking Data Protection in the Age of Zero-Day Attacks
The frequency of zero-day vulnerabilities is increasing, with 97 exploits in 2023, up from 62 in the previous year. Our whitepaper discusses the necessary shift in cybersecurity, emphasising the need to protect data against rising zero-day threats. It argues against relying solely on perimeter-based security and advocates for a proactive, zero-trust data access approach for
Blog
Ransomware Attacks on Active Directory: A Call to Action
In recent years, ransomware attacks surged, threatening businesses globally. By the end of 2023, over 72% of businesses were hit, a record high. A troubling trend is the targeted attack on Active Directory (AD), a crucial network component. We'll explore global ransomware attacks, tactics by groups like AlphaV/BlackCat and Volt Typhoon, shortcomings of traditional defenses, and introduce Certes DPRM as a proactive solution.
Blog
Embracing the Quantum Age: Pioneering Data Privacy
As we enter the quantum era, the transition to quantum-safe cryptography is not just advisable but essential. This shift involves updating cryptographic standards, deploying new encryption solutions, and widespread education on the importance of quantum-resistant methods. With its pioneering efforts in quantum-safe solutions, Certes DPRM is leading the charge in preparing for a secure quantum
Blog
Certes: Rebranding for the Future
Over the last years, data security has evolved and well, so have we. This year, we’re excited to announce a complete rebrand of Certes Networks. Just as we focus our customers on protecting their data rather than traditional network security, we felt it was time this was reflected in our name. We are taking the
Whitepaper
Quantum Computing and the Future of Data Privacy
As the threat of quantum computing to current cryptographic systems looms large, organizations must prepare for the future by adopting quantum-safe encryption solutions. Certes Data Protection and Risk Mitigation (DPRM) emerges as a pioneer in this domain, leveraging quantum physics in its key material and embracing the latest quantum-safe algorithms to safeguard data privacy and
Blog
Understanding and Mitigating Volt Typhoon Attacks
Organisations worldwide are facing a new era of cyber threats, in recent months news has broke that numerous critical infrastructure operators have had their IT systems compromised by Volt Typhoon. We delve into the nuances of Volt Typhoon attacks, share the implications they can have for organisations and the practical strategies to adapt and innovate
Whitepaper
Leading the Charge Towards Quantum-Safe Data Protection
Certes stands as a pioneer in safeguarding sensitive data against emerging threats, particularly those posed by quantum computing advancements. Certes current deployed algorithms include AES-256-GCM – this is widely accepted as ‘Quantum Safe’* – The ETSI (European Standards Organisation) states “AES is considered quantum-safe because the cipher can adapt to a quantum attack by increasing
Whitepaper
Unveiling AlphaV/BlackCat
BlackCat operates on a ransomware as a service (RaaS) model, with developers offering the malware for use by affiliates and taking a percentage of ransom payments. For initial access, the ransomware relies essentially on stolen credentials obtained through initial access brokers. By rethinking security from the ground up, organizations can fortify their defences against the
Whitepaper
Volt Typhoon Attacks on Active Directory
Volt Typhoons activities are challenging to identify and respond to due to the actor’s primary method of attack, “Living off the Land”, which leverages legitimate tools and functionalities already present within a compromised system or network to carry out malicious activities. Rather than relying on conspicuous malware or custom tools that may trigger security alerts,
Blog
Certes Partners with CyberKnight
To support enterprise and government organizations across MENA to better protect and encrypt their sensitive data, CyberKnight has become a value-added distributor for Certes, the industry’s leading Data Protection and Risk Mitigation (DPRM) providers.
Whitepaper
Certes DPRM Framework
In a world dominated by increasing digital threats, conventional network security approaches are falling short of safeguarding an organisation’s critical asset – its data. Despite 61% of risk executives saying data protection and privacy regulations were their biggest priorities, traditional network security measures remain fixated on securing the network and identity perimeter, assuming its sufficient
Blog
Data Protection Risk Mitigation and the TSA SD02D Mandate
The recent ransomware attack on the Colonial Pipeline shook the cybersecurity landscape, forcing a re-evaluation of our national infrastructure’s vulnerability. In response, the Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) collaborated on the Security Directives, known as TSA SD02D. We dive into the practical aspects of cybersecurity, exploring the implications
Blog
Our Top 5 Predictions for 2024 Cybersecurity Landscape
As we step into 2024, technology is making significant progress, and predictions indicate that the world will generate 147 zettabytes of data daily this year. Technology’s central role in our daily lives amplifies the critical need for robust cybersecurity measures. We’ll explore the trends that we believe will shape the landscape in the coming year.
Blog
How to Navigate Data Protection and Risk Mitigation for a Resilient Cybersecurity Strategy
As threats continue to evolve in sophistication, protecting your data against potential breaches and cyber threats becomes increasingly crucial. Businesses are not only grappling with the challenges of cyber threats but also the intricacies of compliance. This is where Data Protection and Risk Mitigation (DPRM) takes the stage, a realm where Certes recognises these key
Whitepaper
CYBERSECURITY A BUSINESS IMPERATIVE: Certes and the TSA SD02D Mandate
The TSA has introduced sensible changes, such as testing cybersecurity policies in real-world scenarios to ensure their effectiveness. Certes cutting-edge DPRM Crypto-Segmentation technology stands at the forefront of safeguarding essential systems, surpassing regulatory mandates such as the TSA SD02D mandate. The overarching mission is to empower organisations to securely navigate our interconnected world.
Blog
C-Suite Liability in Data Protection
Explore the profound impact of data breaches on businesses and C-Suite executives. Learn about the personal liability that top management faces and the costly consequences of weak security measures. Discover the crucial role of C-Suite in data protection and why safeguarding data is not just a tech issue but a fundamental responsibility for organisational leadership.
Whitepaper
THE ROI OF DOING NOTHING
Data security has become personal. Not only are companies now liable for the protection of all personally identifiable information (PII) but the C-suite is personally liable for any failures to protect that information. The C-suite needs to recognise two key points. Firstly, protecting data is a management responsibility. Secondly, network security alone is not enough.
Blog
Meta’s $1.3 billion GDPR Fine: Lessons in Data Protection
In May 2023, we witnessed Meta incur a staggering $1.3 billion GDPR fine, making it the largest-ever fine imposed by the European Union. But what lessons can companies learn from this breach? We delve further into the concept of data sovereignty and the challenges faced by companies like Meta in protecting user data.
Compliance Brief
TSA Directive
The TSA Directive is a set of regulations and guidelines aimed at ensuring the security and safety of air travel, and it’s crucial to adhere to it to protect passengers and prevent potential threats to aviation. Learn more about Certes’ crypto-segmentation to ensure…
Compliance Brief
New York Department of Financial Services
Learn how The New York Department of Financial Services were able to use Certes’ Layer 4 encryption technology quickly and easily to provide uncompromised data protection and crypto-microsegmentation.
Whitepaper
Navigating Data Sovereignty: Lessons from the Meta Breach
Earlier this year, Meta was issued the largest fine ever by the European Union for a GDPR breach at a whopping $1.3 billion. The fine came into place as Meta violated EU privacy laws by transferring the personal data of Facebook users to servers in the United States.
Compliance Brief
Anti-Exfiltraction Solution Cisco HCI
Cisco HCI Server to Secure AWS Cloud Backup over the Internet – The Backup application currently protects Data in Transit via TLS. How can you protect the data itself from the Man in the Middle data exfiltration?
Compliance Brief
Risk Mitigation from a Data Breach for Cisco SD-WAN
By adding a Certes Enforcement Point in-line we can mitigate the impact of this misconfiguration by protecting the sensitive data based on business risk before it gets to the SDWAN or WAN edge.
Infographic
Cyber Security: It’s a jungle out there
Companies often soley rely on Managed Service Providers to guide them through the wilderness of cyber security, but true data protection lies with safeguarding data throughout its entire journey.
Blog
Data Sovereignty: Protecting Your Data in a Globalised World
The implications of transferring data between different countries, the role of Managed Service Providers (MSPs) in data governance, and the potential risks and costs associated with data breaches.
Whitepaper
DIGITAL DATA AND THE PROMISE OF SOVEREIGNTY
With data breaches occurring daily to the world’s largest brands, including high profile tech companies, c-suites of every organisation need urgently to recognise that cyber security it not just about IT, it is about data governance. And the responsibility for data governance falls firmly – and heavily – at the feet of management.
Blog
THE LEGAL LIABILITY DILEMA
How do security leaders navigate the aftermath of a data breach? In the rapid pace of today’s digital landscape, data breaches have become an unfortunate reality for organisations worldwide. As these incidents continue to rise, a growing concern among security leaders, particularly Chief Information Security Officers (CISOs), revolves around their legal liability following such breaches.
Blog
DATA BREACH ACCOUNTABILITY: WHO FOOTS THE BILL?
News stories about cybersecurity data breaches are sometimes difficult to avoid and even more difficult to digest. Data is increasingly valuable to businesses – especially data related to customers, payments and of a sensitive nature.
Whitepaper
PROTECTING DATA AT BOARD LEVEL
Neglecting to safeguard data is equivalent to failing to protect the company, its employees, and shareholder value. Therefore, it is imperative that the C-Suite must understand the significance of data security and the impact it has on their accountability.
Blog
END-TO-END DATA PROTECTION FOR ITAR COMPLIANCE
ITAR compliance has been designed to control access to the various types of technology and information associated with the organisation controlled by ITAR. It’s in place to prevent the disclosure of sensitive data to safeguard US national security.
Use Case
DATA PROTECTION WITH SDWAN
Securing your critical data across the network, on its entire journey, directing traffic according to business intent policies.
Blog
THE CRITICAL ROLE OF DATA SECURITY IN THE C-SUITE
According to IBM, the average cost of a data breach in 2020 hit a whopping $3.86 million. This not only affects a company’s financial health but also its reputation and customer trust, and can even breach regulatory compliance.
Use Case
WHO PAYS FOR A DATA BREACH?
Data breach is almost inevitable – which means it is vital that companies and their Managed Services Providers (MSPs) understand exactly who is responsible and who bears the financial brunt. But recent research reveals that both companies and MSPs are disturbingly unclear about their legal and financial obligations
Blog
END-TO-END DATA PROTECTION : WHAT IT REALLY MEANS
End-to-End Data Protection: What it really means and why you need it. Securing critical data along its entire journey and why.
Use Case
END-TO-END DATA PROTECTION
The provision of cryptographic protection of data, such that the data is not in an unencrypted form, between an originator (or the originator’s in-country security boundary) and an intended recipient (or the recipient’s in- country security boundary).
Use Case
DATA PROTECTION FOR IPSEC
IPsec is often used to establish mutual authentication between computers at the beginning of a session and to negotiate cryptographic keys during a session.
Use Case
DATA PROTECTION FOR MPLS
Provider networks typically leverage MPLS to establish independent IP routing domains on their backbone network, and can leverage other associated protocols to enhance switching of MPLS packets.
Use Case
HIGH ASSURANCE DATA PROTECTION
Securing your critical data across the network, on its entire journey, directing traffic according to business intent policies.
Compliance Brief
END-TO-END ITAR DATA PROTECTION
How Certes meets the ITAR policy requirements and fully comply with regulations required to export and manage classified and unclassified data.
Whitepaper
HIGH ASSURANCE RESEARCH WHITEPAPER
To understand how SD-WAN security is being approached by regulated organisations, Certes Networks commissioned Sapio Research to undertake a survey of Senior Decision Makers, Managers & above who are responsible for or involved in the management of their organisation’s data protection in the UK and USA.
Compliance Brief
OVERCOMING NCUA AUDIT CHALLENGES
The NCUA is a federal government agency responsible for insuring deposits at federally-insured credit unions regulates, charters and supervises all federal credit unions to protect the credit union system and its members. One important program that falls under the scope of its regulatory and supervisory responsibilities is the Information Security Examination and Cybersecurity Assessment Program.
Compliance Brief
UNDERSTANDING NERC CIP 012-1
Standards set out in the (NERC CIP) govern critical infrastructure, requiring utility companies in North America to adhere to a set of cybersecurity measures.
Whitepaper
NIST ZERO TRUST ARCHITECTURE
Certes Networks’ solutions can help organizations meet several requirements of NIST’s Zero Trust Architecture Publication.
Blog
HAVE DATA BREACHES BECOME COMMON?
The year 2020 was a landmark year for data breaches experiencing over 3,800 breaches, which is a 50% greater increase over the last four years.
Blog
HOW LONG DOES IT TAKE TO CONTAIN A DATA BREACH?
Learn about the five most important steps necessary to contain a data breach. Is your organization prepared?
Blog
BUILDING A TRUSTWORTHY DIGITAL ECONOMY
For CEOs, the task is clear: Build a trustworthy digital economy that safeguards our future prosperity.
Tech Soundbite
OBSERVABILITY VS VISIBILITY
Understand how observability and visibility are different and why organizations often confuse the two. Both are equally important but serve very different purposes in protecting data as it crosses the network.
Tech Soundbite
SD-WAN PAVES THE WAY
As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.
Use Case
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN
Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for banking customers.
Use Case
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN
Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for government end-users.
Compliance Brief
CHALLENGES OF UK CYBER SECURITY STANDARDS
United Kingdom National Cyber Security Centre (NCSC) has issued principles for cyber secure enterprise technology to organisations, including guidance on deploying and buying network encryption. Learn more by clicking below.
Compliance Brief
NERC CIP
NERC’s authority has led to critical infrastructure protection (CIP) standards that guide utilities’ to mitigate internal and external security risks. The CIP standards have evolved focusing on both physical security measures and the integration of cybersecurity system technologies and applications.
Compliance Brief
GDPR
Any enterprise that provides a service whereby personal data of a resident of the EU is processed will be impacted by GDPR requirements. Learn more by clicking below.
Compliance Brief
NY SHIELD ACT
The Stop Hacks and Improve Electronic Data Security Handling (SHIELD) Act applies to any entity that processes the private information of residents of New York regardless of where that entity is located. Learn more by clicking below.
Compliance Brief
CALIFORNIA CONSUMER PRIVACY ACT (CCPA)
How the CCPA will impact organizations that conduct business in the State of California, or any business, regardless of location, that process data of a California resident.
Compliance Brief
CJIS SECURITY POLICY
Learn more about the CJIS Security Policy requirements and mandates affecting any entity accessing the information provided by the CJIS database.
Tech Soundbite
BANKING ON SECURITY: KEEPING DATA SECURE
As published in BCW Publisher News, August 2019 and Professional Security, October 2019. “Banking on Security: Keeping Data Secure in Financial Services.”
Tech Soundbite
BANKS MOVE TOWARD SD-WAN TO IMPROVE EXPERIENCE
As published in Finance Digest, January 2020. “How SD-WAN will help banks improve their branch communication and enrich the customer experience.”
Use Case
NATIONAL BANK VLAN-BASED ETHERNET ENCRYPTION
Country’s 7th largest bank with 586 branches nationwide chooses Certes Networks and uses VLAN-based Ethernet encryption to maintain network performance..
Use Case
REGIONAL BANK VoIP ENCRYPTION
Regional bank chooses Certes Networks to deploy group encryption to encrypt VoIP data between 250 locations over a converged MPLS backbone..
Blog
CNI DEPENDS ON STRONG DATA ENCRYPTION
Increasingly, critical infrastructure relies on internet connect industrial control systems (ICS)….
Tech Soundbite
OIL & GAS: KEEPING DATA SECURE
As published in Security Middle East, Business Chief Middle East and Professional Security Magazine: “Keeping Data Secure In the Oil & Gas Industry”.
eBook
COLLABORATION: GOVERNMENT & ICS
Critical infrastructure cybersecurity depends on strong encryption and collaboration between Government and ICS technology.
Use Case
U.S. UTILITY COMPANY
A U.S. diversified energy and utility company that operates in 23 states contacted Certes Networks for an encryption management solution.
Use Case
NATIONAL OIL COMPANY
A National Oil Company wanted visibility of their data as it traversed the network but had no secure key management system to automate easy key rotation nor the ability to define and deploy policies.
Tech Report
LAW ENFORCEMENT: DHS IN CYBER SECURITY
Intelligence community works together with law enforcement to mitigate threats to U.S. cyber and communications systems.
Tech Report
LAW ENFORCEMENT: TARGET FOR CYBER CRIMINALS
Law Enforcement is a highly-focused target for cyber criminals whose sole purpose is to exploit sensitive information and impact a region’s critical infrastructure and services.
Tech Report
LAW ENFORCEMENT & CJIS CHECKLIST
Law Enforcement agencies must use data encryption to comply with CJIS regulations.
Use Case
COLUMBIA COUNTY SHERIFF’S OFFICE & CJIS
Columbia County Sheriff’s Office chooses Certes Networks to encrypt their data using FIPS 140-2 certified technology at six locations to comply with the CJIS Security Policy.
Use Case
COUNTY SHERIFF’S OFFICE & CJIS COMPLIANCE
Maryland County Sheriff’s office chooses Certes Networks to assist with data encryption mandate to comply with CJIS.
Use Case
U.S. LOCAL COUNTY
Leading U.S. local county government agency chooses Certes Network FIPS 140-2 Certified encryption technology to meet CJIS data encryption requirements in order to pass CJIS audit.
Use Case
STATE JUDICIAL DEPARTMENT
A U.S. State Judicial Department encrypts sensitive data and traffic between their courthouse and recovery site aimed at integrating state and federal resources into a single center.
Use Case
USING CRYPTO-SEGMENTATION FOR DATA ASSURANCE
Crypto-segmentation takes on the mission of the old-style router Access Control Lists (ACLs), but with an entirely new approach that allows government to quickly and easily divide physical networks.
Use Case
SMART CITIES
When connectivity and innovation meet such large city infrastructures, they immediately become vulnerable to cyber threats from malicious actors waiting to bring all that hard work to a standstill.
Blog
DHS RANSOMWARE ACT
A new law passed the U.S. Senate demands the federal government heighten its support for organizations hit by ransomware through the DHS Cyber Hunt and Incident Response Teams Act.
Tech Soundbite
CERTES PARTNERSHIP WITH EU COMMISSION
Certes Networks announces its ongoing partnership with the European Commission as a trusted cybersecurity technology provider.
Tech Soundbite
UK CYBER SECURITY STANDARDS
Certes Networks helps public sector organisations in the UK migrate from Legacy MPLS to SDN and SD-WAN network architectures due to ever-evolving government cyber security standards.
Use Case
MINISTRY OF FOREIGN AFFAIRS
Eastern European Ministry of Foreign Affairs protects essential network applications with Certes Layer 4 solution..
Blog
CALIFORNIA PRIVACY LAW GOES BEYOND TECH
California residents will have the right to ask retailers, restaurants, airlines, banks etc to provide them with any personal information.
Use Case
GOVERNMENT AGENCIES MOVE TO SD-WAN
U.S. Federal and national government agencies turning to SD-WAN to modernize their wide-area network in order to make Zero Trust a best practice.