TMCnet News
Certes Frictionless Crypto-Segmentation Security Solution Blocks #1 Hacking Attack VectorPITTSBURGH, Sept. 3, 2015 /PRNewswire/ -- Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications, today announced the company's award-winning CryptoFlow® product suite supports Crypto-Segmentation, enabling end-to-end protection of sensitive enterprise applications both inside and outside the traditional enterprise perimeter. Certes CryptoFlows are the industry's first software-defined security solution for safeguarding enterprise applications over any network for any user on any device. They enable "frictionless enterprise" deployments of networked applications to be rolled out without increasing risk, while blocking the top attack vector used in hacking attacks worldwide: the compromise of low-privilege users and unfettered access to sensitive applications. With recent extensions to support new devices and use cases, the CryptoFlow product family now supports Crypto-Segmentation of enterprise applications to provide:
With Crypto-Segmentation, CryptoFlows automatically contain and constrain hackers exploting compromised user credentials by blocking lateral movement from application to application. CryptoFlow solutions stop the top attack vector used in breach after breach in the recent high-profile hacking attacks around the globe. In these cases, hackers compromised the credentials of a single low privilege user or even an external contractor, then utilized these credentials to bypass firewalls, access enterprise applications and exploit vulnerabilities to jump to the sensitive applications containing the most valuable data or accessing most critical assets. By enforcing role-based access control over all users for all applications, CryptoFlows ensure that users can access only the applications that they need to do their jobs. If a user is compromised, a hacker can gain access to only the narrow set of applications available to that user and the hacker is blocked from lateral movement to the more sensitive applications. "Perimeter-based security is woefully inadequate for protecting today's enterprise applications," said industry analyst Jason Bloomberg, President of Intellyx & Contributor to Forbes. "The flexibility and fluidity of today's borderless enterprise applications require an end-to-end rethink of security. Certes Networks' approach for segmenting applications and networks closely aligns to how users and applications operate in the modern, digital IT environment." Certes CryptoFlows are infrastructure agnostic, enforcing security with standalone policy enforcers or as virtualized enforcement points in the Cloud or on third-party devices. Certes' award-winning CryptoFlow security products are the centerpiece of Certes' perfect 15-year track record of 7,300 product deployments in 84 countries without a single successful hack of any protected application. "The reality is that today's enterprise is only as safe as its least secure user, contractor or supply chain member," said Satyam Tyagi, Certes Networks' CTO. "In every major data breach of the past two years, hackers made it past the firewalls by using simple attacks to steal low-privilege credentials. They then were able to jump into more sensitive applications and do the most damage. We are directly addressing this major vulnerability and dramatically reducing breach damage and risk with our Crypto-Segmentation solutions." Certes CryptoFlow solutions and Crypto-Segmentation techniques will be highlighted in a free webinar featuring Intellyx and Certes on Sep. 24. Learn more at: CertesNetworks.com/intellyx-webinar About Certes Networks To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/certes-frictionless-crypto-segmentation-security-solution-blocks-1-hacking-attack-vector-300137661.html SOURCE Certes Networks |