Menu

Company Profile

Certes Networks protects data in motion. The company’s award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network device or application performance. Companies around the world rely on network encryption products from Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure. For more information, visit certesnetworks.com.

Certes Networks Seminars

  • Shrinking the Enterprise Attack Surface in the Age of Cloud, Mobility and Ubiquitous Access Eugene Rusen  |   Certes Networks   |   Wed 5th Oct 15:00 - 15:30

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 15:00 to 15:30

    Shrinking the Enterprise Attack Surface in the Age of Cloud, Mobility and Ubiquitous Access

    The attack surface of enterprises is exploding, with widespread adoption of the Cloud, new smart devices, and app access extended to users of all types inside and outside the perimeter. Yet the foundational IT security architecture has remained the same, giving rise to a continuing wave of data breaches. Just like stealth technology shrinks the targetable attack surface of a ship, emerging best practices are proving to reduce the attack surface of an enterprise that is exposed to attackers. These techniques focus on aligning security controls with business needs while also containing breaches when attackers compromise the infrastructure.

    Speaker

    Speaker Name Profile
    Eugene Rusen View Profile
  • Shrink the Attack Surface: Managing Risk in the Modern Enterprise Eugene Rusen  |   Certes Networks   |   Thu 6th Oct 11:00 - 11:30

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 11:00 to 11:30

    Shrink the Attack Surface: Managing Risk in the Modern Enterprise

    Enterprises around the world are revolutionizing business with digitization, highly mobile workforces, advanced partner collaboration, and ever more agile operations driven by evolved IT. Yet widespread data breaches and increasingly damaging hacking incidents show that the security architecture must evolve as well. This workshop will explore the operational and technical factors driving the expansion of the typical enterprise attack surface and new techniques to reduce risk exposure and improve defenses.

    Speaker

    Speaker Name Profile
    Eugene Rusen View Profile

White papers

Securing the Frictionless Enterprise
There are security tools aplenty, and cybersecurity is a booming business to be sure. But the attacks continue unabated. Something has got to give.

Intellyx IoT White Paper for Certes FINAL.pdf 588.83 kB


TREND ADVISOR: Hacking Crisis Highlights ‘Crypto Chaos’
Four Data Traffic Security Challenges Exposing Enterprises to Hack Attacks

Trend Advisor - Hacking Crisis Highlights ‘Crypto Chaos’.pdf 1.15 MB


TREND ADVISOR: Principles & Policies of Perpetual Paranoia
The New Rules for Enterprise IT Security

Trend Advisor - Principles & Policies of Perpetual Paranoia.pdf 663.21 kB


TREND ADVISOR: Securing Networked Applications with Cryptographic Segmentation
Securing Networked Applications with Cryptographic Segmentation

Trend Advisor - Securing Networked Applications with Cryptographic Segmentation.pdf 750.30 kB


TrustNet CryptoFlowTM Group Encryption
Protecting data in motion has become a high priority for a growing number of companies.

Group Encryption.pdf 198.51 kB


Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook