Resources
  • All
  • Blog
  • Compliance Brief
  • Infographic
  • Tech Report
  • Tech Soundbite
  • Use Case
  • Video
  • Whitepaper
Certes: Rebranding for the Future - title
Blog

Certes: Rebranding for the Future

Over the last years, data security has evolved and well, so have we. This year, we’re excited to announce a complete rebrand of Certes Networks. Just as we focus our customers on protecting their data rather than traditional network security, we felt it was time this was reflected in our name.  We are taking the
Quantum Computing and the Future of Data Privacy - title
Whitepaper

Quantum Computing and the Future of Data Privacy

As the threat of quantum computing to current cryptographic systems looms large, organizations must prepare for the future by adopting quantum-safe encryption solutions. Certes Data Protection and Risk Mitigation (DPRM) emerges as a pioneer in this domain, leveraging quantum physics in its key material and embracing the latest quantum-safe algorithms to safeguard data privacy and
Understanding and Mitigating Volt Typhoon Attacks - title
Blog

Understanding and Mitigating Volt Typhoon Attacks

Organisations worldwide are facing a new era of cyber threats, in recent months news has broke that numerous critical infrastructure operators have had their IT systems compromised by Volt Typhoon. We delve into the nuances of Volt Typhoon attacks, share the implications they can have for organisations and the practical strategies to adapt and innovate
Leading the Charge Towards Quantum-Safe Data Protection - title
Whitepaper

Leading the Charge Towards Quantum-Safe Data Protection

Certes stands as a pioneer in safeguarding sensitive data against emerging threats, particularly those posed by quantum computing advancements. Certes current deployed algorithms include AES-256-GCM – this is widely accepted as ‘Quantum Safe’* – The ETSI (European Standards Organisation) states “AES is considered quantum-safe because the cipher can adapt to a quantum attack by increasing
Unveiling AlphaV/BlackCat - title
Whitepaper

Unveiling AlphaV/BlackCat

BlackCat operates on a ransomware as a service (RaaS) model, with developers offering the malware for use by affiliates and taking a percentage of ransom payments. For initial access, the ransomware relies essentially on stolen credentials obtained through initial access brokers. By rethinking security from the ground up, organizations can fortify their defences against the
Volt Typhoon Attacks on Active Directory - title
Whitepaper

Volt Typhoon Attacks on Active Directory

Volt Typhoons activities are challenging to identify and respond to due to the actor’s primary method of attack, “Living off the Land”, which leverages legitimate tools and functionalities already present within a compromised system or network to carry out malicious activities. Rather than relying on conspicuous malware or custom tools that may trigger security alerts,
Certes Partners with CyberKnight - title
Blog

Certes Partners with CyberKnight

To support enterprise and government organizations across MENA to better protect and encrypt their sensitive data, CyberKnight has become a value-added distributor for Certes, the industry’s leading Data Protection and Risk Mitigation (DPRM) providers.
Certes DPRM Framework - title
Whitepaper

Certes DPRM Framework

In a world dominated by increasing digital threats, conventional network security approaches are falling short of safeguarding an organisation’s critical asset – its data. Despite 61% of risk executives saying data protection and privacy regulations were their biggest priorities, traditional network security measures remain fixated on securing the network and identity perimeter, assuming its sufficient
Data Protection Risk Mitigation and the TSA SD02D Mandate - title
Blog

Data Protection Risk Mitigation and the TSA SD02D Mandate

The recent ransomware attack on the Colonial Pipeline shook the cybersecurity landscape, forcing a re-evaluation of our national infrastructure’s vulnerability. In response, the Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) collaborated on the Security Directives, known as TSA SD02D. We dive into the practical aspects of cybersecurity, exploring the implications
Our Top 5 Predictions for 2024 Cybersecurity Landscape - title
Blog

Our Top 5 Predictions for 2024 Cybersecurity Landscape

As we step into 2024, technology is making significant progress, and predictions indicate that the world will generate 147 zettabytes of data daily this year. Technology’s central role in our daily lives amplifies the critical need for robust cybersecurity measures. We’ll explore the trends that we believe will shape the landscape in the coming year.
How to Navigate Data Protection and Risk Mitigation for a Resilient Cybersecurity Strategy - title
Blog

How to Navigate Data Protection and Risk Mitigation for a Resilient Cybersecurity Strategy

As threats continue to evolve in sophistication, protecting your data against potential breaches and cyber threats becomes increasingly crucial. Businesses are not only grappling with the challenges of cyber threats but also the intricacies of compliance. This is where Data Protection and Risk Mitigation (DPRM) takes the stage, a realm where Certes recognises these key
CYBERSECURITY A BUSINESS IMPERATIVE: Certes and the TSA SD02D Mandate - title
Whitepaper

CYBERSECURITY A BUSINESS IMPERATIVE: Certes and the TSA SD02D Mandate

The TSA has introduced sensible changes, such as testing cybersecurity policies in real-world scenarios to ensure their effectiveness. Certes cutting-edge DPRM Crypto-Segmentation technology stands at the forefront of safeguarding essential systems, surpassing regulatory mandates such as the TSA SD02D mandate. The overarching mission is to empower organisations to securely navigate our interconnected world.
C-Suite Liability in Data Protection - title
Blog

C-Suite Liability in Data Protection

Explore the profound impact of data breaches on businesses and C-Suite executives. Learn about the personal liability that top management faces and the costly consequences of weak security measures. Discover the crucial role of C-Suite in data protection and why safeguarding data is not just a tech issue but a fundamental responsibility for organisational leadership.
THE ROI OF DOING NOTHING - title
Whitepaper

THE ROI OF DOING NOTHING

Data security has become personal. Not only are companies now liable for the protection of all personally identifiable information (PII) but the C-suite is personally liable for any failures to protect that information. The C-suite needs to recognise two key points. Firstly, protecting data is a management responsibility. Secondly, network security alone is not enough.
Meta’s $1.3 billion GDPR Fine: Lessons in Data Protection - title
Blog

Meta’s $1.3 billion GDPR Fine: Lessons in Data Protection

In May 2023, we witnessed Meta incur a staggering $1.3 billion GDPR fine, making it the largest-ever fine imposed by the European Union. But what lessons can companies learn from this breach? We delve further into the concept of data sovereignty and the challenges faced by companies like Meta in protecting user data.
TSA Directive - title
Compliance Brief

TSA Directive

The TSA Directive is a set of regulations and guidelines aimed at ensuring the security and safety of air travel, and it’s crucial to adhere to it to protect passengers and prevent potential threats to aviation. Learn more about Certes’ crypto-segmentation to ensure…
New York Department of Financial Services - title
Compliance Brief

New York Department of Financial Services

Learn how The New York Department of Financial Services were able to use Certes’ Layer 4 encryption technology quickly and easily to provide uncompromised data protection and crypto-microsegmentation.
Navigating Data Sovereignty: Lessons from the Meta Breach - title
Whitepaper

Navigating Data Sovereignty: Lessons from the Meta Breach

Earlier this year, Meta was issued the largest fine ever by the European Union for a GDPR breach at a whopping  $1.3 billion. The fine came into place as Meta violated EU privacy laws by transferring the personal data of Facebook users to servers in the United States.
Anti-Exfiltraction Solution Cisco HCI - title
Compliance Brief

Anti-Exfiltraction Solution Cisco HCI

Cisco HCI Server to Secure AWS Cloud Backup over the Internet – The Backup application currently protects Data in Transit via TLS. How can you protect the data itself from the Man in the Middle data exfiltration?
Risk Mitigation from a Data Breach for Cisco SD-WAN - title
Compliance Brief

Risk Mitigation from a Data Breach for Cisco SD-WAN

By adding a Certes Enforcement Point in-line we can mitigate the impact of this misconfiguration by protecting the sensitive data based on business risk before it gets to the SDWAN or WAN edge.
Cyber Security: It’s a jungle out there - title
Infographic

Cyber Security: It’s a jungle out there

Companies often soley rely on Managed Service Providers to guide them through the wilderness of cyber security, but true data protection lies with safeguarding data throughout its entire journey.
Data Sovereignty: Protecting Your Data in a Globalised World - title
Blog

Data Sovereignty: Protecting Your Data in a Globalised World

The implications of transferring data between different countries, the role of Managed Service Providers (MSPs) in data governance, and the potential risks and costs associated with data breaches.
DIGITAL DATA AND THE PROMISE OF SOVEREIGNTY - title
Whitepaper

DIGITAL DATA AND THE PROMISE OF SOVEREIGNTY

With data breaches occurring daily to the world’s largest brands, including high profile tech companies, c-suites of every organisation need urgently to recognise that cyber security it not just about IT, it is about data governance. And the responsibility for data governance falls firmly – and heavily – at the feet of management.
THE LEGAL LIABILITY DILEMA - title
Blog

THE LEGAL LIABILITY DILEMA

How do security leaders navigate the aftermath of a data breach? In the rapid pace of today’s digital landscape, data breaches have become an unfortunate reality for organisations worldwide. As these incidents continue to rise, a growing concern among security leaders, particularly Chief Information Security Officers (CISOs), revolves around their legal liability following such breaches.
DATA BREACH ACCOUNTABILITY: WHO FOOTS THE BILL? - title
Blog

DATA BREACH ACCOUNTABILITY: WHO FOOTS THE BILL?

News stories about cybersecurity data breaches are sometimes difficult to avoid and even more difficult to digest. Data is increasingly valuable to businesses – especially data related to customers, payments and of a sensitive nature.
PROTECTING DATA AT BOARD LEVEL - title
Whitepaper

PROTECTING DATA AT BOARD LEVEL

Neglecting to safeguard data is equivalent to failing to protect the company, its employees, and shareholder value. Therefore, it is imperative that the C-Suite must understand the significance of data security and the impact it has on their accountability.
END-TO-END DATA PROTECTION FOR ITAR COMPLIANCE - title
Blog

END-TO-END DATA PROTECTION FOR ITAR COMPLIANCE

ITAR compliance has been designed to control access to the various types of technology and information associated with the organisation controlled by ITAR. It’s in place to prevent the disclosure of sensitive data to safeguard US national security.
DATA PROTECTION WITH SDWAN - title
Use Case

DATA PROTECTION WITH SDWAN

Securing your critical data across the network, on its entire journey, directing traffic according to business intent policies.
THE CRITICAL ROLE OF DATA SECURITY IN THE C-SUITE - title
Blog

THE CRITICAL ROLE OF DATA SECURITY IN THE C-SUITE

According to IBM, the average cost of a data breach in 2020 hit a whopping $3.86 million. This not only affects a company’s financial health but also its reputation and customer trust, and can even breach regulatory compliance.
WHO PAYS FOR A DATA BREACH? - title
Use Case

WHO PAYS FOR A DATA BREACH?

Data breach is almost inevitable – which means it is vital that companies and their Managed Services Providers (MSPs) understand exactly who is responsible and who bears the financial brunt. But recent research reveals that both companies and MSPs are disturbingly unclear about their legal and financial obligations
END-TO-END DATA PROTECTION : WHAT IT REALLY MEANS - title
Blog

END-TO-END DATA PROTECTION : WHAT IT REALLY MEANS

End-to-End Data Protection: What it really means and why you need it. Securing critical data along its entire journey and why.
END-TO-END DATA PROTECTION - title
Use Case

END-TO-END DATA PROTECTION

The provision of cryptographic protection of data, such that the data is not in an unencrypted form, between an originator (or the originator’s in-country security boundary) and an intended recipient (or the recipient’s in- country security boundary).
DATA PROTECTION FOR IPSEC - title
Use Case

DATA PROTECTION FOR IPSEC

IPsec is often used to establish mutual authentication between computers at the beginning of a session and to negotiate cryptographic keys during a session.
DATA PROTECTION FOR MPLS - title
Use Case

DATA PROTECTION FOR MPLS

Provider networks typically leverage MPLS to establish independent IP routing domains on their backbone network, and can leverage other associated protocols to enhance switching of MPLS packets.
HIGH ASSURANCE DATA PROTECTION - title
Use Case

HIGH ASSURANCE DATA PROTECTION

Securing your critical data across the network, on its entire journey, directing traffic according to business intent policies.
END-TO-END ITAR DATA PROTECTION - title
Compliance Brief

END-TO-END ITAR DATA PROTECTION

How Certes meets the ITAR policy requirements and fully comply with regulations required to export and manage classified and unclassified data.
HIGH ASSURANCE RESEARCH WHITEPAPER - title
Whitepaper

HIGH ASSURANCE RESEARCH WHITEPAPER

To understand how SD-WAN security is being approached by regulated organisations, Certes Networks commissioned Sapio Research to undertake a survey of Senior Decision Makers, Managers & above who are responsible for or involved in the management of their organisation’s data protection in the UK and USA.
OVERCOMING NCUA AUDIT CHALLENGES - title
Compliance Brief

OVERCOMING NCUA AUDIT CHALLENGES

The NCUA is a federal government agency responsible for insuring deposits at federally-insured credit unions regulates, charters and supervises all federal credit unions to protect the credit union system and its members. One important program that falls under the scope of its regulatory and supervisory responsibilities is the Information Security Examination and Cybersecurity Assessment Program.
UNDERSTANDING NERC CIP 012-1 - title
Compliance Brief

UNDERSTANDING NERC CIP 012-1

Standards set out in the (NERC CIP) govern critical infrastructure, requiring utility companies in North America to adhere to a set of cybersecurity measures.
NIST ZERO TRUST ARCHITECTURE - title
Whitepaper

NIST ZERO TRUST ARCHITECTURE

Certes Networks’ solutions can help organizations meet several requirements of NIST’s Zero Trust Architecture Publication.
HAVE DATA BREACHES BECOME COMMON? - title
Blog

HAVE DATA BREACHES BECOME COMMON?

The year 2020 was a landmark year for data breaches experiencing over 3,800 breaches, which is a 50% greater increase over the last four years.
HOW LONG DOES IT TAKE TO CONTAIN A DATA BREACH? - title
Blog

HOW LONG DOES IT TAKE TO CONTAIN A DATA BREACH?

Learn about the five most important steps necessary to contain a data breach.  Is your organization prepared?
BUILDING A TRUSTWORTHY DIGITAL ECONOMY - title
Blog

BUILDING A TRUSTWORTHY DIGITAL ECONOMY

For CEOs, the task is clear: Build a trustworthy digital economy that safeguards our future prosperity.
OBSERVABILITY VS VISIBILITY - title
Tech Soundbite

OBSERVABILITY VS VISIBILITY

Understand how observability and visibility are different and why organizations often confuse the two.  Both are equally important but serve very different purposes in protecting data as it crosses the network.
SD-WAN PAVES THE WAY - title
Tech Soundbite

SD-WAN PAVES THE WAY

As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN - title
Use Case

MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN

Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for banking customers.
MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN - title
Use Case

MSP & MULTIPLE CARRIER NETWORKS OVER AN SD-WAN

Global Managed Service Provider uses Certes Networks for an on-premise SD-WAN solution to provide improved services across multiple carrier networks for government end-users.
CHALLENGES OF UK CYBER SECURITY STANDARDS - title
Compliance Brief

CHALLENGES OF UK CYBER SECURITY STANDARDS

United Kingdom National Cyber Security Centre (NCSC) has issued principles for cyber secure enterprise technology to organisations, including guidance on deploying and buying network encryption.  Learn more by clicking below.
PCI DSS COMPLIANCE - title
Compliance Brief

PCI DSS COMPLIANCE

Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices and requirements for processing, transmission and storage of consumer credit card information.
NERC CIP - title
Compliance Brief

NERC CIP

NERC’s authority has led to critical infrastructure protection (CIP) standards that guide utilities’ to mitigate internal and external security risks. The CIP standards have evolved focusing on both physical security measures and the integration of cybersecurity system technologies and applications.
GDPR - title
Compliance Brief

GDPR

Any enterprise that provides a service whereby personal data of a resident of the EU is processed will be impacted by GDPR requirements.  Learn more by clicking below.
NY SHIELD ACT - title
Compliance Brief

NY SHIELD ACT

The Stop Hacks and Improve Electronic Data Security Handling (SHIELD) Act applies to any entity that processes the private information of residents of New York regardless of where that entity is located.  Learn more by clicking below.
CALIFORNIA CONSUMER PRIVACY ACT (CCPA) - title
Compliance Brief

CALIFORNIA CONSUMER PRIVACY ACT (CCPA)

How the CCPA will impact organizations that conduct business in the State of California, or any business, regardless of location, that process data of a California resident.
CJIS SECURITY POLICY - title
Compliance Brief

CJIS SECURITY POLICY

Learn more about the CJIS Security Policy requirements and mandates affecting any entity accessing the information provided by the CJIS database.
BANKING ON SECURITY: KEEPING DATA SECURE - title
Tech Soundbite

BANKING ON SECURITY: KEEPING DATA SECURE

As published in BCW Publisher News, August 2019 and Professional Security, October 2019.  “Banking on Security:  Keeping Data Secure in Financial Services.”
BANKS MOVE TOWARD SD-WAN TO IMPROVE EXPERIENCE - title
Tech Soundbite

BANKS MOVE TOWARD SD-WAN TO IMPROVE EXPERIENCE

As published in Finance Digest, January 2020.  “How SD-WAN will help banks improve their branch communication and enrich the customer experience.”
NATIONAL BANK VLAN-BASED ETHERNET ENCRYPTION - title
Use Case

NATIONAL BANK VLAN-BASED ETHERNET ENCRYPTION

Country’s 7th largest bank with 586 branches nationwide chooses Certes Networks and uses VLAN-based Ethernet encryption to maintain network performance..
REGIONAL BANK VoIP ENCRYPTION - title
Use Case

REGIONAL BANK VoIP ENCRYPTION

Regional bank chooses Certes Networks to deploy group encryption to encrypt VoIP data between 250 locations over a converged MPLS backbone..
CNI DEPENDS ON STRONG DATA ENCRYPTION - title
Blog

CNI DEPENDS ON STRONG DATA ENCRYPTION

Increasingly, critical infrastructure relies on internet connect industrial control systems (ICS)….
OIL & GAS: KEEPING DATA SECURE - title
Tech Soundbite

OIL & GAS: KEEPING DATA SECURE

As published in Security Middle East, Business Chief Middle East and Professional Security Magazine: “Keeping Data Secure In the Oil & Gas Industry”.
COLLABORATION: GOVERNMENT & ICS - title
eBook

COLLABORATION: GOVERNMENT & ICS

Critical infrastructure cybersecurity depends on strong encryption and collaboration between Government and ICS technology.
U.S. UTILITY COMPANY - title
Use Case

U.S. UTILITY COMPANY

A U.S. diversified energy and utility company that operates in 23 states contacted Certes Networks for an encryption management solution.
NATIONAL OIL COMPANY - title
Use Case

NATIONAL OIL COMPANY

A National Oil Company wanted visibility of their data as it traversed the network but had no secure key management system to automate easy key rotation nor the ability to define and deploy policies.
LAW ENFORCEMENT: DHS IN CYBER SECURITY - title
Tech Report

LAW ENFORCEMENT: DHS IN CYBER SECURITY

Intelligence community works together with law enforcement to mitigate threats to U.S. cyber and communications systems.
LAW ENFORCEMENT: TARGET FOR CYBER CRIMINALS - title
Tech Report

LAW ENFORCEMENT: TARGET FOR CYBER CRIMINALS

Law Enforcement is a highly-focused target for cyber criminals whose sole purpose is to exploit sensitive information and impact a region’s critical infrastructure and services.
LAW ENFORCEMENT & CJIS CHECKLIST - title
Tech Report

LAW ENFORCEMENT & CJIS CHECKLIST

Law Enforcement agencies must use data encryption to comply with CJIS regulations.
COLUMBIA COUNTY SHERIFF’S OFFICE & CJIS - title
Use Case

COLUMBIA COUNTY SHERIFF’S OFFICE & CJIS

Columbia County Sheriff’s Office chooses Certes Networks to encrypt their data using FIPS 140-2 certified technology at six locations to comply with the CJIS Security Policy.
COUNTY SHERIFF’S OFFICE & CJIS COMPLIANCE - title
Use Case

COUNTY SHERIFF’S OFFICE & CJIS COMPLIANCE

Maryland County Sheriff’s office chooses Certes Networks to assist with data encryption mandate to comply with CJIS.
U.S. LOCAL COUNTY - title
Use Case

U.S. LOCAL COUNTY

Leading U.S. local county government agency chooses Certes Network FIPS 140-2 Certified encryption technology to meet CJIS data encryption requirements in order to pass CJIS audit.
STATE JUDICIAL DEPARTMENT - title
Use Case

STATE JUDICIAL DEPARTMENT

A U.S. State Judicial Department encrypts sensitive data and traffic between their courthouse and recovery site aimed at integrating state and federal resources into a single center.
USING CRYPTO-SEGMENTATION FOR DATA ASSURANCE - title
Use Case

USING CRYPTO-SEGMENTATION FOR DATA ASSURANCE

Crypto-segmentation takes on the mission of the old-style router Access Control Lists (ACLs), but with an entirely new approach that allows government to quickly and easily divide physical networks.
SMART CITIES - title
Use Case

SMART CITIES

When connectivity and innovation meet such large city infrastructures, they immediately become vulnerable to cyber threats from malicious actors waiting to bring all that hard work to a standstill.
DHS RANSOMWARE ACT - title
Blog

DHS RANSOMWARE ACT

A new law passed the U.S. Senate demands the federal government heighten its support for organizations hit by ransomware through the DHS Cyber Hunt and Incident Response Teams Act.
CERTES PARTNERSHIP WITH EU COMMISSION - title
Tech Soundbite

CERTES PARTNERSHIP WITH EU COMMISSION

Certes Networks announces its ongoing partnership with the European Commission as a trusted cybersecurity technology provider.
UK CYBER SECURITY STANDARDS - title
Tech Soundbite

UK CYBER SECURITY STANDARDS

Certes Networks helps public sector organisations in the UK migrate from Legacy MPLS to SDN and SD-WAN network architectures due to ever-evolving government cyber security standards.
MINISTRY OF FOREIGN AFFAIRS - title
Use Case

MINISTRY OF FOREIGN AFFAIRS

Eastern European Ministry of Foreign Affairs protects essential network applications with Certes Layer 4 solution..
CALIFORNIA PRIVACY LAW GOES BEYOND TECH - title
Blog

CALIFORNIA PRIVACY LAW GOES BEYOND TECH

California residents will have the right to ask retailers, restaurants, airlines, banks etc to provide them with any personal information.
GOVERNMENT AGENCIES MOVE TO SD-WAN - title
Use Case

GOVERNMENT AGENCIES MOVE TO SD-WAN

U.S. Federal and national government agencies turning to SD-WAN to modernize their wide-area network in order to make Zero Trust a best practice.

Contact Us

Want to learn more? One of our team members would be happy to help!