Cryptographic Module Validation Program FIPS and FIPS Modules In Process List
|
|
- Tyler Ford
- 8 years ago
- Views:
Transcription
1 Thunder Series Application Delivery Controller TH4430S, TH5630S, and TH6630S A10 Networks, Inc. Acronis Cryptographic Module Acronis International GmbH ACOS5-64 Advanced Card Systems Ltd. AirTight Wireless Sensor AirTight Networks, Inc. ACI-3002-S Controller Apcon, Inc. Apple ios CoreCrypto Kernel Module v6.0 Apple Inc. Apple ios CoreCrypto Module v6.0 Apple Inc. Apple OS X CoreCrypto Kernel Module v6.0 Apple Inc. Apple OS X CoreCrypto Module, v6.0 Apple Inc. identear Apply Mobile Aruba AP-324, AP-325, AP-228 Wireless Access Points Aruba Aruba RAP-155 and RAP-155P Wireless Access Points Aruba Aruba RAP-3WN, RAP-3WNP, RAP-108, RAP-109, AP-114 and AP-115 Wireless Access Aruba Aruba RAP-5WN Remote Access Point Aruba Aruba IAP-204, IAP-205, IAP-224, IAP-225, IAP-274, IAP-275, RAP-3WN, RAP-3WNP, RAP-108 and Aruba Networks, Inc. RAP-109 Wireless Access Points with Aruba Instant Firmware Aruba Virtual Mobility Controller - Tactical, with ArubaOS FIPS Firmware Aruba Networks, Inc. Common Cryptographic Module Aruba Networks, Inc. CoSign ARX (Algorithmic Research) TransformIT Arxan Technologies Attivo Cryptographic Module Attivo Networks, Inc. BotSink 2500, 3200 and 5100 Attivo Networks, Inc. BotSink ACM Attivo Networks, Inc. Avaya G450 FIPS Cryptographic Firmware Module Avaya G430 FIPS Cryptographic Firmware Avaya, Inc. Module B+B SmartWorx Cryptographic Module B&B Electronics Becrypt Cryptographic Library Becrypt Limited BorderGuard 5000 Blue Ridge Networks Box JCA Cryptographic Module Box, Inc. Brocade VDX 6740, VDX 6740T, VDX 6940 and VDX 8770 Switches Brocade Communications Systems, Inc. Brocade(R) DCX, DCX , DCX-4S and DCX Backbones, 6510 and 6520 FC Switches, and Brocade Communications Systems, Inc Extension Switch Brocade(R) FCX 624/648, ICX 6450, ICX 7750, ICX 7250 and SX 800/1600 Series Brocade Communications Systems, Inc. Brocade(R) ICX (TM) 6610 and ICX 7450 Series Brocade Communications Systems, Inc. Brocade NetIron CER 2000 Ethernet Routers and Brocade CES 2000 Routers and Switches Brocade Communications Systems, Inc. CHR Cryptographic Module Bull atos technologies PTP 700 Point to Point Wireless Ethernet Bridge Cambium Networks, Ltd. NIST CMVP 1 of 8 Updated: 1/25/2016
2 Canon imagerunner Crypto Module for MEAP Canon U.S.A., Inc. CC FM TLS/SRTP Cardiocom, LLC CENTRI BitSmart Enterprise Client 2.0 CENTRI Technology CENTRI BitSmart Enterprise Server 2.0 CENTRI Technology mtoken CryptoID Century Longmai Technology Co. Ltd FibeAir IP-20 Ceragon Networks Ltd. Security Builder Linux Kernel Cryptographic Module Certicom Corp. Check Point Cryptographic Library Check Point Software Technologies Ltd. HiCOS PKI Native Smart Card Cryptographic Module Chunghwa Telecom Co., Ltd. Ciena 6500 Packet-Optical Platform 4x10G Ciena Corporation WaveLogic 3 Extreme Krypto Engine Ciena Corporation Cisco Catalyst 3560-C, 3560-X and 3750-X Switches Cisco System, Inc. Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst 4507R-E, Catalyst 4510R-E, Catalyst 4510R, Catalyst Cisco System, Inc. C4500X-16SFP, Catalyst C4500X-F-16SFP, Catalyst C4500X-32SFP, Catalyst C4500X-F-32SFP, Catalyst C4500X-24X-ES, Catalyst C4500X-40X-ES, Catalyst C4500X-24X Cisco 19XX, 29XX, 39XX, and 5900 ESR Cisco 891W, 1941W, IR829W Cisco ASA 5506, ASA 5506H, ASA 5506W, ASA 5508-X, ASA 5512-X, ASA 5515-X, ASA 5516, ASA 5525-X, ASA 5545-X, ASA 5555-X, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Adaptive Security Appliances Cisco ASA Service Module (SM) Cisco ASA Virtual Adaptive Security Appliances Cisco C819, C880, C890 ISRs, CGR 2010, C800M, 5900 ESR and IR809 Cisco Catalyst 6503-E, Catalyst C6504-E, Catalyst 6506-E, Catalyst 6509-E, Catalyst 6807-X and Catalyst 6513-E Switches with Supervisor Cards (VS-S2T-10G and VS-S2T-10G-XL) and Line Cards (WS-X G, WS-X G-2TXL, WS-X G-2T and WS-X G- Cisco Catalyst 6880-X and Catalyst 6880-X LE with Line Cards (C6880-X-16P10G, and C6880-X-LE- 16P10G) and 6800IA Cisco Cloud Services Router 1000 Virtual Cisco Optical Networking Solution (ONS) Multiservice Transport Platforms (MSTPs) & NCS 2000 Series Cleversafe FIPS Cryptographic Module Cleversafe, Inc. Unified Crypto Module Comtech EF Data Corporation Cotap Cryptographic Module Cotap, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 Dell SonicWALL SM 9800 SMA 6200 and SMA 7200 The Privileged Appliance and Modules (TPAM) TZ 105, TZ 105W, TZ 205, TZ 205W, TZ 210, TZ 210W, TZ 215 and TZ 215W NIST CMVP 2 of 8 Updated: 1/25/2016
3 Distributed Key Protection ECI TR10_4EN Encryption Module VNX 6 Gb/s SAS I/O Module with Encryption from EMC EROAD Cryptographic Module OpenSSL crypto for BIG-IP TMM crypto for BIG-IP Fatpipe Encryption Module FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FireEye MX Series: MX 900, MX 8400 FireEye PX Series: PX 004S, PX 1004ESS16, PX 1004EXT4, PX 1020ESS16, PX 1020EXT10, PX 1020EXT20, PX 1040EXT20, PX 2004ESS24, PX 2004ESS48, PX 2020ESS24, PX 2020ESS48, PX 2040ESS48 FortiAP-320C FortiClient 5.0 VPN Client FortiClient 5.0 VPN Client FortiMail 5.2 FortiMail-1000D and FortiMail-3000D StarSign Crypto-USB Token S powered by Sm@rtCafé Expert 7.0 Secure Element RF-7800W Broadband Ethernet Radio RF-7850S Secure Personal Radio Voltage Cryptographic Module v5.0 HPE series and 5830AF series switches Multiple Aruba AP-134 and AP-135 Wireless Access Points Aruba AP-92, AP-93, AP-104, AP-105 and AP-175 Wireless Access Points HP BladeSystem Onboard Administrator Firmware ilo 4 Cryptographic Module HP 6125XLG Blade Switches HP Enterprise Secure Key Manager HP LTO-6 Tape Drive HP Networking Switches HP Networking Switches HID Global ActivID Applet Suite v2.7.3 on Giesecke & Devrient Sm@rtCafé Expert 7.0 HID Global ActivID Applet Suite v2.7.3 on Oberthur Technologies Cosmo V8 CM1+ cocrypt CM1+ CM2 Dyadic Security Ltd ECI Telecom Ltd. EMC Corporation EROAD Limited F5 Networks, Inc. F5 Networks, Inc. FatPipe Inc. FireEye, Inc. FireEye, Inc. FireEye, Inc. Giesecke & Devrient GmbH Harris Corporation Harris Corporation Hewlett Packard Hewlett Packard Enterprise Hewlett Packard Enterprise Hewlett Packard Enterprise Company Hewlett Packard Enterprise Company Hewlett Packard Enterprise Development LP Hewlett Packard Enterprise Development LP HID Global and Giesecke & Devrient HID Global and Oberthur Technologies Hiddn Security AS Hiddn Security AS High Density Devices AS NIST CMVP 3 of 8 Updated: 1/25/2016
4 Hospira CE3.x OpenSSL Cryptographic Module Hospira HP StoreOnce Backup System HP Storage Voltage Cryptographic Module v.5.0 HPE Data Security Huawei FIPS Cryptographic Library (HFCL) Huawei Hypori ACE Device Hypori IBM(R) Security QRadar(R) Cryptographic Security Kernel IBM Corporation IBM Java JCE FIPS Cryptographic Module IBM Corportation IBM Security SiteProtector System Cryptographic Module IBM Security IBM Security XGS 3100, XGS 4100, XGS 5100, and XGS 7100 IBM Security Network Intrusion Prevention System (NIPS) IBM Security IBM LTO Generation 7 Encrypting Tape Drive IBM(R) Corporation IBM 4767 Cryptographic Coprocessor Security Module IBM Corporation Evolution e8350-fipsl2 Satellite Router [1], iconnex e800-fipsl2 Satellite Router Board [2], iconnex idirect Government e850mp-fipsl2 Satellite Router Board [3], Evolution em1d1-fipsl2 Line Card [4], and Evolution em0dm-fipsl2 Line Card [5] Imprivata FIPS Crypto Module v1.0 Imprivata, Inc. Trusted Platform Module 1.2 SLB 9660/SLB 9665/SLB 9670 Infineon Technologies AG IAS Router (IAS STEW, IAS KG-RU, and IAS Router MICRO models) Information Assurance Specialists, Inc. Integral AES 256 Bit Crypto SSD Underlying PCB Integral Memory PLC. Integral Crypto AES 256 Bit USB 3.0 Integral Memory PLC. INTEGRITY Security Services High Assurance Embedded Cryptographic Toolkit Integrity Security Services/Green Hills Software Cryptographic Module for Intel(R) vpro(tm) Platforms' Security Engine Chipset Intel Corporation Intel Rangeley Digital Random Number Generator Intel Corporation McAfee Linux Cryptographic Module Intel Corporation FIPS Crypto Module (FCM) Ionic Security Inc. datashur Pro istorage Limited Juniper Networks EX3300 and EX2200 Ethernet Switches Juniper Networks EX4300 and EX4600 Ethernet Switches Juniper Networks LN1000 and LN2600 Secure Routers Juniper Networks MX Series 3D Universal Edge Routers: MX 240, MX 480, MX 960, MX 2010 & MX 2020 with the Routing Engine 1800 Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Juniper Networks SRX1400, SRX3400, and SRX3600 Services Gateways Juniper Networks SRX5400, SRX5600, and SRX5800 Services Gateways MX Series 3D Universal Edge Routers with the Multiservice MS-MIC-16 and MS-MPC-128 Kaspersky Cryptographic Module (Kernel Mode) Kaspersky Lab UK Ltd. Kaspersky Cryptographic Module (Pre-Boot) Kaspersky Lab UK Ltd. NIST CMVP 4 of 8 Updated: 1/25/2016
5 Kaspersky Cryptographic Module (User Mode) Kaspersky Lab UK Ltd. Kingston DataTraveler DT4000 Series USB Flash Drive Kingston Technology Company, Inc esrvivr(r) Cockpit Voice and Flight Data Recorder (CVFDR) Encryption Module L-3 Communications, Aviation Recorders BC-FJA (Bouncy Castle FIPS Java API) Legion of the Bouncy Castle Inc. Lenovo Kernel Crypto API Library A for System x Lenovo Group Limited Lenovo Kernel Crypto API Library B for System x Lenovo Group Limited Lenovo OpenSSL Library for System x Lenovo Group Limited LG Framework Cryptographic Module LG Electronics, Inc. LG Kernel Cryptographic Module LG Electronics, Inc. LG OpenSSL Cryptographic Module LG Electronics, Inc. Monet 2.0 Marvell Semiconductor, Inc. McAfee Firewall Enterprise McAfee Network Security Platform NS-7100, NS-7200, NS-7300 Network Security Platform Sensor M-1250, M-1450, M-2750, M-2850, M-2950, M-3050, M-4050 and M Network Security Platform Sensor M-8000 P Network Security Platform Sensor M-8000 S Network Security Platform Sensor NS-9100 and NS-9200 Network Security Platform Sensor NS-9300 P Network Security Platform Sensor NS-9300 S BitLocker(R) Dump Filter (dumpfve.sys) in Microsoft Windows 10 Pro, Windows 10 Enterprise, Windows Microsoft Corporation 10 Enterprise LTSB BitLocker(R) Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Microsoft Corporation Enterprise, Windows 10 Enterprise LTSB BitLocker(R) Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Microsoft Corporation Enterprise, Windows 10 Enterprise LTSB Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise Microsoft Corporation LTSB Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Microsoft Corporation Enterprise LTSB Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Microsoft Corporation Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Microsoft Corporation Windows 10 Enterprise, Windows 10 Enterprise LTSB Secure Kernel Code Integrity (skci.dll) in Microsoft Windows 10 Enterprise, Windows 10 Enterprise LTSB Microsoft Corporation Proteus MX Cryptographic Module Microwave Networks Inc. Motorola GGM 8000 Gateway Motorola Solutions Systems Polska Sp. z o.o. Motorola Network Router (MNR) S6000 Motorola Solutions Systems Polska Sp. z o.o. Motorola Solutions Astro Subscriber umace - Level 2 Motorola Solutions, Inc. NIST CMVP 5 of 8 Updated: 1/25/2016
6 Motorola Solutions Astro Subscriber umace - Level 3 LX-4000T Series Console Servers NetApp Cryptographic Security Module v1.0 SR-OS Cryptographic Module NPCT6XX TPM 1.2 NPCT6XX TPM 2.0 Acme Packet 1100 and Acme Packet 3900 Acme Packet 4600 Acme Packet Virtual Machine Edition (VME) Oracle Solaris Kernel Cryptographic Framework Oracle Solaris Userland Cryptographic Framework Oracle StorageTek T10000D Tape Drive PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls PA-3060 and PA-7080 Firewalls Palo Alto Networks VM-Series WildFire WF-500 Panorama M-100/M-500 HSID5000 QTI Crypto Engine Core QTI Inline Crypto Engine (SDCC) QTI Inline Crypto Engine (UFS) QTI Pseudo Random Number Generator Alteon - Application Deliver Controller Series 5208/XX, 6420/XX, 8420/XX BreadCrumb LX4 BreadCrumb ME4 Cryptosec Dekaton Red Hat Enterprise Linux 6.6 Kernel Crypto API Cryptographic Module Red Hat Enterprise Linux 6.6 NSS Module Red Hat Enterprise Linux 7.1 GnuTLS Cryptographic Module Red Hat Enterprise Linux 7.1 Kernel Crypto API Cryptographic Module Red Hat Enterprise Linux 7.1 Libgcrypt Cryptographic Module Red Hat Enterprise Linux 7.1 Libreswan Cryptographic Module Red Hat Enterprise Linux 7.1 NSS Cryptographic Module Red Hat Enterprise Linux 7.1 OpenSSH Client Cryptographic Module Red Hat Enterprise Linux 7.1 OpenSSH Server Cryptographic Module RDL-3000 and elte-mt RS9113 Cryptographic Module Validation Program Motorola Solutions, Inc. MRV Communications, Inc. NetApp Nokia Corporation Nuvoton Technology Corporation Nuvoton Technology Corporation Palo Alto Networks Palo Alto Networks Palo Alto Networks Palo Alto Networks Palo Alto Networks, Inc. Parsec Qualcomm Technologies, Inc Qualcomm Technologies, Inc Qualcomm Technologies, Inc Qualcomm Technologies, Inc. Radware Ltd. Rajant Corporation Rajant Corporation Realia Technologies, S.L. Redline Communications Redpine Signals, Inc. NIST CMVP 6 of 8 Updated: 1/25/2016
7 VERN (TM) RMW Crypto Library Relocation Management Worldwide Samsung SCrypto Samsung Electronics Co., Ltd. Seagate Secure(R) TCG Enterprise SSC SSD Self-Encrypting Drive Seagate Technology LLC SecureParser Security First Corp. CN Series Ethernet Encryptors Senetas Corporation Ltd. and SafeNet Inc. CN1000/CN3000 Series Encryptors Senetas Corporation Ltd. and SafeNet Inc. CN6000 Series Encryptors Senetas Corporation Ltd. and SafeNet Inc. Teamcenter Cryptographic Module Siemens PLM Software Inc. Java Crypto Module Skyhigh Networks SBC 5110 and 5210 Session Border Controllers Sonus Networks, Inc. SBC 7000 Session Border Controller Sonus Networks, Inc. Xperia Cryptographic Module Sony Mobile Communications, Inc. SPYRUS USB-3 Module SPYRUS Inc. SPYCOS 3.0 QFN Spyrus, Inc. Spyrus MDTU-P384 Spyrus, Inc. SUSE Linux Enterprise Server 12 - Kernel Crypto API Cryptographic Module SUSE, LLC SUSE Linux Enterprise Server 12 - NSS Module SUSE, LLC Symantec Messaging Gateway Cryptographic Module Symantec Corporation Tanium Cryptographic Module Tanium, Inc. TCS Galatea 2 Serial ATA (SATA) Solid State Drive (SSD) TeleCommunication Systems (TCS) Datacryptor 100M Ethernet Thales e-security Datacryptor Gig Ethernet and 10 Gig Ethernet Thales e-security MiniHSM [1], MiniHSM for nshield Edge [2] and MiniHSM for Time Stamp Master Clock [3] MiniHSM [1], MiniHSM for nshield Edge [2] and MiniHSM for Time Stamp Master Clock [3] nshield F [1], nshield F [2] and nshield F [3] nshield F2 6000e [1], nshield F2 1500e [2], nshield F2 500e [3] and nshield F2 10e [4] nshield F3 10+ [1], nshield F [2], nshield F [3], nshield F for nshield Connect+ [4], nshield F for nshield Connect+ [5] and nshield F for nshield Connect+ [6] nshield F3 10+ [1], nshield F [2], nshield F [3], nshield F for nshield Connect+ [4], nshield F for nshield Connect+ [5] and nshield F for nshield Connect+ [6] nshield F3 6000e [1], nshield F3 1500e [2], nshield F3 500e [3], nshield F3 10e [4], nshield F3 6000e for nshield Connect [5], nshield F3 1500e for nshield Connect [6] and nshield F3 500e for nshield Connect [7] nshield Solo XC F2 nshield Solo XC F3 [1] and nshield Solo XC F3 for nshield Connect XC [2] nshield Solo XC F3 [1] and nshield Solo XC F3 for nshield Connect XC [2] nshield Remote Administration Token Thales e-security Ltd. ntoken Thales-eSecurity Inc. NIST CMVP 7 of 8 Updated: 1/25/2016
8 Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module Unisys Linux Kernel Cryptographic API Module SafeGuard CryptoServer CSe Vaultive Cryptographic Module VeloCloud Cryptographic Security Module Viptela Cryptographic Module V-Key Cryptographic Module VMware Horizon JCE (Java Cryptographic Extension) Module Vocera Cryptographic Module v3.0 Vormetric Data Security Manager Module Vormetric Data Security Manager Virtual Appliance Module WatchGuard Firebox M200, M300, M400, M500, M440, M4600, M5600 WatchGuard Firebox T10, T10-W, T30, T30-W, T50, T50-W C Crypto Module v2.0 XTec Cryptographic Module HSM-ZJ2014 ZBR-88W8787-WLAN R Series Data Comm II Cryptographic Module Validation Program Ultra Electronics AEP Unisys Corporation Utimaco Safeware AG Vaultive, Inc. VeloCloud Networks Inc. Viptela, Inc. V-Key VMware, Inc. Vocera Communications, Inc. Vormetric Inc. Vormetric Inc. WatchGuard Technologies, Inc. WatchGuard Technologies, Inc. Websense XTec, Inc. Zanjia Electronic Science & Technology (Beijing) Co., LTD Zebra Technologies, Corp. ZOLL Medical Corporation Displayed: Not Displayed: Total: NIST CMVP 8 of 8 Updated: 1/25/2016
Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List
40- and FIPS 40-2 Modules In Process List Updated 4/27/205 SoftAX A0 Networks, Thunder 4435S TPS, 4435 TPS, 5435 TPS, 5435S TPS, 6435 TPS and 6435S TPS A0 Networks, Thunder Series Application Delivery
More informationSupported Devices (Event Log Sources)
Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110
More informationList of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
More informationCryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List
40- and FIPS 40-2 Modules In Process List Updated 6/25/200 3e-525A-3, 3e-525A-3EP, 3e-525A-3MP, 3e-525V-3 and 3e-525Ve-4 AirGuardÖ 3e Technologies International, Inc. Wireless Access Points 3e-523-F2 and
More informationSNMP Collector Supported Device Inventory
Acme Acme Packet SD-3820 Border Controller Alcatel Bluecoat Alcatel 6850 BLUE COAT AV2400 / State of Device Utilization QoS Utilization QoS Subsystem Backplane Module 1.4 BLUE COAT AV510 Lan/Wan BLUE COAT
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationOceanStor VTL Solution V100R001 Interoperability Matrix
OceanStor Solution V100R001 Interoperability Matrix Issue 1.0 Date 2016-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationRSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method
RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server
More informationGlobal IT Networks Skills Matrix
Global IT Networks Skills Matrix Server Core Infrastructure and Management Windows Server (all versions) SQL (Infrastructure) SQL (DBA) Active Directory Active Directory Certificate s Active Directory
More informationHardware and Software Interoperability Matrix
Hardware and Software Interoperability Matrix This document provides interoperability matrices for Cisco Unified Computing components and configurations that have been tested and validated by Cisco, by
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationImplementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)
Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft)
More informationINTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationBLADESYSTEM FIRMWARE UPDATES BEST PRACTICES
BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES Session 3547 Greg Fields Hewlett Packard Account Support Manager Minneapolis, Minnesota 2011 Hewlett-Packard Development
More informationDelivery Method Chart: Replacement Parts and Installation of Integrated Software Updates
Delivery Method Chart: Replacement Parts and Installation of Table of Contents Overview:... 3 Replacement Parts Delivery Method... 3 Delivery Method... 3 Oracle Desktop and Thin Client... 4 Sun Desktop...
More informationJunos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document
Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper
More informationCommonwealth of Virginia Security and Search Network Appliances. IFB 2015-02 - Exhibit E - Pricing. Product Price List. phone: (301)670-0381 email:
IFB 201502 Exhibit E Pricing Product Price List Supplier Name: DALY COMPUTERS, INC. Submitted By: JEFF DI BELLA phone: (301)6700381 email: VASALES@DALY.COM NOTE: Authorized Contract Users must request
More informationaddress) : (True IP Address)
: WiFi : : (2010 83 ) ( ) : : (True IP Address) (Intranet address) : (True IP Address) : : : : : WiFi : : WiFi : WiFi 1. Please provide the detail of the access portal on: - Hardware configuration - Operating
More informationFirewall and VPN Top Level Selected Products: Directory & Buyer's Guide
Brochure More information from http://www.researchandmarkets.com/reports/45717/ Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Description: Firewalls are an integral part of any
More informationPRESIDIO MANAGED SERVICES OVERVIEW
OVERVIEW VALUE AND COMMITMENT OUR COMMITMENT In our pursuit of excellence for Managed Services we dedicate our team to support the strategic business and IT drivers from our customers. Enabling you to
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationCompetitive Replacement Program: Product Matrix
Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationINFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW
Summary Purpose Business Value Product Type Technical function/certifications Product Family Name 1 General purpose Hardware Security Modules (HSMs) To securely protect cryptographic keys wherever they
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationNetwork Industry Trends
Network Industry Trends Friday October 24, 2008 Dennis Smith The Bank of New York Mellon First Vice President Infrastructure Advanced Engineering Agenda The Bank of New York Mellon History of the Network
More informationMANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com
MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM
More informationService Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement
Service Description Remote Consulting Service Introduction to your service agreement Remote ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services ). Each RCS
More informationFujitsu PRIMERGY Servers Portfolio
Fujitsu Servers Portfolio Complete server solutions that drive your success shaping tomorrow with you Higher IT efficiency and reduced total cost of ownership Fujitsu Micro and Tower Servers MX130 S2 TX100
More informationInteroperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption
Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security
More informationFactory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
More informationCustomer Advantage Program
Customer Advantage Program Straightforward upgrades and competitive trade-ins for Dell Security customers The Dell Security Customer Advantage Program offers an upgrade path from current Dell SonicWALL
More informationPlugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo
Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee
More informationQuickSpecs. HP Library and Tape Tools. Features & Benefits. HP Library and Tape Tools. Overview
Overview (L&TT) is a free, robust diagnostic tool for HP StoreEver Tape Family. Targeted for a wide range of users, it is ideal for customers who want to verify their installation, ensure product reliability,
More informationCisco License Manager 3.1
Product Bulletin Cisco License Manager 3.1 Last Updated: May 2011 Cisco announces Cisco License Manager 3.1 for managing Cisco IOS Software activation and license management for a wide range of Cisco platforms
More informationCONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
More informationDevice Adapter Capabilities Report
Device Adapter Capabilities Report Page 1 of 19 Span Custom 3Com 4500 3Com 4500 3.02 and 3Com SuperStack 3 3Com SuperStack 3Com 3200, 3800, 3.12 and 4200, 4400, 4900 3Com 1100, 3300 2.7 and 3Com 3Com 50
More informationSonicWALL Customer Advantage Program Secure Upgrade Plus and Customer Loyalty Bundle Terms and Conditions
The following terms and conditions apply to the Customer Advantage Program Secure Upgrade Plus To qualify for Secure Upgrade Plus, the participant must be the legal Owner of the Eligible Product or Eligible
More informationAEP Systems. Federal PKI Technical Working Group June 2003
AEP Systems Federal PKI Technical Working Group June 2003 Company Background Founded: 1998 Employees: 62 The marriage of two companies: Baltimore Technologies Hardware Group (Zergo) (Security) AEP Systems
More informationIVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE:
IVAN WINDON - CCENT 5295 S Netherland Way, Centennial, CO 80015 720.258.6311 c https://www.l3pdu.com ivan.windon@l3pdu.com NETWORK / SYSTEMS ADMINISTRATOR Solutions-focused IT professional driven to advance
More informationMobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
More informationSUSE Linux Enterprise 12 Security Certifications
SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security thomas@suse.com 2 Evaluation Validation
More informationIt is by bringing the best IT skills together in one place that can help your business meet current and future challenges.
The Vision. It is by bringing the best IT skills together in one place that can help your business meet current and future challenges. To be recognised as delivering exceptional business benefits to loyal
More informationArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
More informationUN 4013 V - Virtual Tape Libraries solutions update...
UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,
More informationWNYRIC Standards List as of August, 2015
1. Computers Acer Apple Asus Tablet only Dell HP Lenovo Microsoft Nexlink Seneca Data-NNI Samsung Chromebook only Sony Toshiba Page 1 of 22 2. Communications Equipment Routers/Switches Avaya-Nortel Systems
More informationInformation Security Recommendation Report
Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results
More informationSecure Upgrade Plus. Customer Advantage Program. Secure Upgrade Plus. Customer Loyalty Bundles. Address other business needs
Secure Upgrade Plus Straightforward upgrades and competitive trade-ins for Dell SonicWALL customers Secure Upgrade Plus offers an upgrade path from current Dell SonicWALL products, as well as a trade-in
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationFirewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY
Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Firewall Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc. Lexington, Massachusetts www.wintergreenresearch.com
More informationPrivateServer HSM Integration with Microsoft IIS
PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document
More informationSUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com Agenda Evaluation
More informationkerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies
KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP
More informationPulse Secure Desktop Client Supported Platforms Guide
Pulse Secure Desktop Client Platforms Guide Pulse Secure Desktop Client v5.1 For more information on this product, go to www.pulsesecure.net/products. Product Release Published Document Version 5.1R5 October
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Platforms Guide Product Release 5.1 Document Revision 2.0 Published: 2015-02-25 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
More informationService Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement
Service Description Remote Consulting Service Introduction to your service agreement Remote Consulting Services ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services
More informationCloud on TEIN Part I: OpenStack Cloud Deployment. Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University
Cloud on TEIN Part I: OpenStack Cloud Deployment Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University Outline Objectives Part I: OpenStack Overview How OpenStack
More informationNetBrain Workstation 6.0
Live Discovery: NetBrain can discover and map any SNMP reachable device. Device Vendor and Type Support Level Provided Tier 1 Tier 2 Tier 3 Router Alcatel Lucent Service Router Yes Yes Yes Cisco IOS Router
More informationJunos Pulse Supported Platforms Guide
Junos Pulse Platforms Guide 5.0R1 November 2013 Contents Introduction........................................................ 2 Documentation...................................................... 2 Hardware
More informationRSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000
RSA Security RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI RSA BSAFE 5 Web RSA SecurID 4000 EMC Security Strategy 1 Assess Risk EMC Infoscape Discovery Solutions EMC TS Security Practice EMC Services
More information13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America
VMware, Inc. VMware Kernel Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared by: VMware, Inc. 3401
More informationWHY TIGERDIRECT BUSINESS?
WHY TIGERDIRECT BUSINESS? TigerDirect is a subsidiary of Systemax Inc. a Fortune 1000 company (NYSE: SYX). Systemax is a leading provider of IT solutions and products and industrial products to businesses
More informationSymantec NetBackup Enterprise Server and Server 7.0-7.6.x Hardware Compatibility List
Symantec NetBackup Server and Server 7.0-7.6.x Hardware Compatibility List Created on April 03, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and NetBackup
More informationTIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
More informationMicrosoft Azure Configuration
Microsoft Azure Configuration Azure Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 VNS3 Configuration Document
More informationAPPENDIX C PRICING INDEX DIR-TSO-2540
Product Category MSRP DIR Customer from MSRP [or Firm Fixed Price] Systems Hardware and Software Global Price List See Note 1 See Note 3 Oracle E-business Component Applications Global Price List Oracle
More informationEvaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
More informationSmart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
More informationwww.cosmetisuite.com 530-852-0306 Info@CosmetiSuite.com
Meditab - CosmetiSuite Cloud Hosting 1. System requirements 1.1 Workstations Workstations Workstations (Desktop/Laptop/Tablet PC) High-Usage Workstations (Provider/Critical Tasks) Component Minimum Specifications
More informationUtility Modernization Cyber Security City of Glendale, California
Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased
More informationby Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
More informationCiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationStrong data protection. Strategic business value. www.thales-esecurity.com
Someone is stalking your sensitive data. Coveting your intellectual property. Waiting for the slightest crack in the window of opportunity to hack it, misuse it, and run. How can you best protect and control
More informationTotal Protection for Enterprise-Advanced
System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)
More informationSupported Platforms HPE Vertica Analytic Database. Software Version: 7.2.x
HPE Vertica Analytic Database Software Version: 7.2.x Document Release Date: 2/4/2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the
More informationOverland Storage Compatibility Guide
Overland Storage Compatibility Guide The Overland Software and Hardware Compatibility Guide lists which software and hardware have been tested for interoperability with all Overland products. Overland
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationWindows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
More informationAirWave 7.7. Server Sizing Guide
AirWave 7.7 Server Sizing Guide Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba
More informationPart-1: SERVER AND PC
Part-1: SERVER AND PC Item Item Details Manufacturer Quantity Unit Price Total Dell server or equivalent Intel Xeon E5-2420 1.90GHz, 15M Cache, 7.2GT/s QPI, Turbo, 6C, 95W or equivalent PCIE Riser for
More informationEncrypting Data at Rest
Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire
More informationOpenFlow/So+ware- defined Networks. Srini Seetharaman Clean Slate Lab Stanford University July 2010
OpenFlow/So+ware- defined Networks Srini Seetharaman Clean Slate Lab Stanford University July 2010 Outline MoFvaFon OpenFlow - Technical details Overall ecosystem Deployments We have lost our way RouFng,
More informationOpenFlow Technology Investigation Vendors Review on OpenFlow implementation
OpenFlow Technology Investigation Vendors Review on OpenFlow implementation Ioan Turus, NORDUnet GN3 JRA1 T1&2, Copenhagen, 21.11.2012 Outline! Software Defined Networks (SDN)! Introduction to OpenFlow!
More informationINSTRUCTIONS. Product and Service Price List Worksheet Instructions
INSTRUCTIONS Product and Service List Worksheet Instructions Respondents shall complete each tab within the pricing workbooks for each Category that they are proposing. All unit cost fields shall be populated
More informationNET ACCESS VOICE PRIVATE CLOUD
Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of
More informationCommon Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se
More informationLicenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
More informationTechnical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com
Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning
More informationSymantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and
More informationSYSTEM REQUIREMENTS Single User & Red River Software ASP Users (See Specific Info for Tills and/or Meters) are not Supported in RRS
SYSTEM REQUIREMENTS Single User & Red River Software ASP Users (See Specific Info for Tills and/or Meters) Microsoft Windows Vista Business or Ultimate (Vista Home Basic and Home Premium not Supported)
More informationHow To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On
ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements
More informationTIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More information