CERTES NETWORKS INC in Encryption Software

Are you from this Company?
CERTES NETWORKS INC
Pennyslyvania, USA
2000
Below $10 MN
Enterprise
53 Likes
81 Buyers Negotiating

Summary

- Certes offers the Layer 4 solution, that helps businesses to encrypt the data independent of the applications and network without interrupting the network infrastructure
- The Certes Layer 4 solution also helps organizations with secured masked encryption of the payload
- Certes' CryptoFlow Net Creator (CFNC) solution enables organizations to have full control of their security posture. It provides an interactive GUI and drag-and- drop tool, to help companies deploy policies with ease from one central point of control
- CFNC also helps professionals in the generation of keys to secure the entire network infrastructure
- Certes Enforcement Point (CEP) Appliances offer data protection and application segmentation solution
- The CEPs can be combined easily into any existing network, whether Legacy or 3rdparty networks

Discussions

Strengths
  • +12
    Professional Services
  • +14
    Support and Maintenance
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +7
    Large Enterprises
  • +14
    Directly
  • +9
    On-Premise
  • +5
    Through Partners / Third-Party Vendors
  • +12
    Cloud Encryption
  • +10
    Database and Application Encryption
  • +13
    Data Encryption
  • +8
    Disk Encryption
  • +9
    File/Folder Encryption
  • +8
    SMEs
  • +12
    Data-at-rest encryption
  • +11
    Data-in-motion encryption
  • +14
    Virtual machine instance encryption
  • +13
    Managed Services
  • +10
    Customer Redressal Mechanism/Program
Cautions
  • -9
    Level of Support
  • -5
    Consulting Service
  • -6
    Training and education
  • -10
    Patented inhouse algorithm
  • -10
    IaaS
  • -9
    PaaS
  • -8
    SaaS
  • -10
    Cloud
  • -11
    Communication Encryption (Voice email, and message)
  • -14
    Data Loss Prevention
  • -6
    Key Management
  • -5
    Tokenization
  • -7
    Others
  • -6
    Application-level encryption
  • -8
    Application-level tokenization
  • -7
    Column-level encryption
  • -13
    Data-in- process/use encryption
  • -5
    File level encryption
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup