Certes announces CyberKnight as its new VAD to provide the industry’s most advanced DPRM platform in the MENA region.
To support enterprise and government organizations across MENA to better protect and encrypt their sensitive data, CyberKnight has become a value-added distributor for Certes. Certes execute a business risk mitigation solution designed to safeguard data at its source, ensuring protection throughout its journey and mitigating the impact of regulatory fines in the event of a breach.
DPRM comprises of four key pillars featuring Layer 4 Data Payload Protection, Separation of Key Policy Ownership, Crypto-Segmentation, and Data Security Unified Reporting. Together they help to build a foundation of business success and genuine data protection, empowering organizations to take a proactive approach that prioritizes prevention over cure.
“Certes complements our Zero Trust Security portfolio and allows us to offer a simple solution that ensures maximum security with improved efficiency and lower management overhead to organizations with highly sensitive data or multiple sites. With the DRPM solution from Certes, our customers can be sure that their data assurance posture will scale to support the depth and breadth of their environment, whether deployed top-of-rack, in a virtual environment, between data centers and applications or simply just across the WAN or SD-WAN,” commented Wael Jaber, Chief Strategy Officer, CyberKnight.
“This collaboration underscores our commitment to safeguarding our customers’ most valuable assets – their data – with robust security and peace of mind across the Middle East and North Africa. The DPRM solution seamlessly integrates with existing security infrastructures, delivering unparalleled performance without any disruptions, and offering substantial cost and time efficiencies to our valued customers,” added Dan Panesar, Chief Revenue Officer, Certes.
Certes patented technology applies protection to the Data Payload without impacting any other part of the IP packet information, so all traditional network security and reporting tools function the same after DPRM is inserted into the network as it did before. It is transparent to other network devices.