Cryptographic Module Validation Program FIPS and FIPS Modules In Process List

Size: px
Start display at page:

Download "Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List"

Transcription

1 Thunder Series Application Delivery Controller TH4430S, TH5630S, and TH6630S A10 Networks, Inc. Acronis Cryptographic Module Acronis International GmbH ACOS5-64 Advanced Card Systems Ltd. AirTight Wireless Sensor AirTight Networks, Inc. ACI-3002-S Controller Apcon, Inc. Apple ios CoreCrypto Kernel Module v6.0 Apple Inc. Apple ios CoreCrypto Module v6.0 Apple Inc. Apple OS X CoreCrypto Kernel Module v6.0 Apple Inc. Apple OS X CoreCrypto Module, v6.0 Apple Inc. identear Apply Mobile Aruba AP-324, AP-325, AP-228 Wireless Access Points Aruba Aruba RAP-155 and RAP-155P Wireless Access Points Aruba Aruba RAP-3WN, RAP-3WNP, RAP-108, RAP-109, AP-114 and AP-115 Wireless Access Aruba Aruba RAP-5WN Remote Access Point Aruba Aruba IAP-204, IAP-205, IAP-224, IAP-225, IAP-274, IAP-275, RAP-3WN, RAP-3WNP, RAP-108 and Aruba Networks, Inc. RAP-109 Wireless Access Points with Aruba Instant Firmware Aruba Virtual Mobility Controller - Tactical, with ArubaOS FIPS Firmware Aruba Networks, Inc. Common Cryptographic Module Aruba Networks, Inc. CoSign ARX (Algorithmic Research) TransformIT Arxan Technologies Attivo Cryptographic Module Attivo Networks, Inc. BotSink 2500, 3200 and 5100 Attivo Networks, Inc. BotSink ACM Attivo Networks, Inc. Avaya G450 FIPS Cryptographic Firmware Module Avaya G430 FIPS Cryptographic Firmware Avaya, Inc. Module B+B SmartWorx Cryptographic Module B&B Electronics Becrypt Cryptographic Library Becrypt Limited BorderGuard 5000 Blue Ridge Networks Box JCA Cryptographic Module Box, Inc. Brocade VDX 6740, VDX 6740T, VDX 6940 and VDX 8770 Switches Brocade Communications Systems, Inc. Brocade(R) DCX, DCX , DCX-4S and DCX Backbones, 6510 and 6520 FC Switches, and Brocade Communications Systems, Inc Extension Switch Brocade(R) FCX 624/648, ICX 6450, ICX 7750, ICX 7250 and SX 800/1600 Series Brocade Communications Systems, Inc. Brocade(R) ICX (TM) 6610 and ICX 7450 Series Brocade Communications Systems, Inc. Brocade NetIron CER 2000 Ethernet Routers and Brocade CES 2000 Routers and Switches Brocade Communications Systems, Inc. CHR Cryptographic Module Bull atos technologies PTP 700 Point to Point Wireless Ethernet Bridge Cambium Networks, Ltd. NIST CMVP 1 of 8 Updated: 1/25/2016

2 Canon imagerunner Crypto Module for MEAP Canon U.S.A., Inc. CC FM TLS/SRTP Cardiocom, LLC CENTRI BitSmart Enterprise Client 2.0 CENTRI Technology CENTRI BitSmart Enterprise Server 2.0 CENTRI Technology mtoken CryptoID Century Longmai Technology Co. Ltd FibeAir IP-20 Ceragon Networks Ltd. Security Builder Linux Kernel Cryptographic Module Certicom Corp. Check Point Cryptographic Library Check Point Software Technologies Ltd. HiCOS PKI Native Smart Card Cryptographic Module Chunghwa Telecom Co., Ltd. Ciena 6500 Packet-Optical Platform 4x10G Ciena Corporation WaveLogic 3 Extreme Krypto Engine Ciena Corporation Cisco Catalyst 3560-C, 3560-X and 3750-X Switches Cisco System, Inc. Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst 4507R-E, Catalyst 4510R-E, Catalyst 4510R, Catalyst Cisco System, Inc. C4500X-16SFP, Catalyst C4500X-F-16SFP, Catalyst C4500X-32SFP, Catalyst C4500X-F-32SFP, Catalyst C4500X-24X-ES, Catalyst C4500X-40X-ES, Catalyst C4500X-24X Cisco 19XX, 29XX, 39XX, and 5900 ESR Cisco 891W, 1941W, IR829W Cisco ASA 5506, ASA 5506H, ASA 5506W, ASA 5508-X, ASA 5512-X, ASA 5515-X, ASA 5516, ASA 5525-X, ASA 5545-X, ASA 5555-X, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Adaptive Security Appliances Cisco ASA Service Module (SM) Cisco ASA Virtual Adaptive Security Appliances Cisco C819, C880, C890 ISRs, CGR 2010, C800M, 5900 ESR and IR809 Cisco Catalyst 6503-E, Catalyst C6504-E, Catalyst 6506-E, Catalyst 6509-E, Catalyst 6807-X and Catalyst 6513-E Switches with Supervisor Cards (VS-S2T-10G and VS-S2T-10G-XL) and Line Cards (WS-X G, WS-X G-2TXL, WS-X G-2T and WS-X G- Cisco Catalyst 6880-X and Catalyst 6880-X LE with Line Cards (C6880-X-16P10G, and C6880-X-LE- 16P10G) and 6800IA Cisco Cloud Services Router 1000 Virtual Cisco Optical Networking Solution (ONS) Multiservice Transport Platforms (MSTPs) & NCS 2000 Series Cleversafe FIPS Cryptographic Module Cleversafe, Inc. Unified Crypto Module Comtech EF Data Corporation Cotap Cryptographic Module Cotap, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 Dell SonicWALL SM 9800 SMA 6200 and SMA 7200 The Privileged Appliance and Modules (TPAM) TZ 105, TZ 105W, TZ 205, TZ 205W, TZ 210, TZ 210W, TZ 215 and TZ 215W NIST CMVP 2 of 8 Updated: 1/25/2016

3 Distributed Key Protection ECI TR10_4EN Encryption Module VNX 6 Gb/s SAS I/O Module with Encryption from EMC EROAD Cryptographic Module OpenSSL crypto for BIG-IP TMM crypto for BIG-IP Fatpipe Encryption Module FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FireEye MX Series: MX 900, MX 8400 FireEye PX Series: PX 004S, PX 1004ESS16, PX 1004EXT4, PX 1020ESS16, PX 1020EXT10, PX 1020EXT20, PX 1040EXT20, PX 2004ESS24, PX 2004ESS48, PX 2020ESS24, PX 2020ESS48, PX 2040ESS48 FortiAP-320C FortiClient 5.0 VPN Client FortiClient 5.0 VPN Client FortiMail 5.2 FortiMail-1000D and FortiMail-3000D StarSign Crypto-USB Token S powered by Sm@rtCafé Expert 7.0 Secure Element RF-7800W Broadband Ethernet Radio RF-7850S Secure Personal Radio Voltage Cryptographic Module v5.0 HPE series and 5830AF series switches Multiple Aruba AP-134 and AP-135 Wireless Access Points Aruba AP-92, AP-93, AP-104, AP-105 and AP-175 Wireless Access Points HP BladeSystem Onboard Administrator Firmware ilo 4 Cryptographic Module HP 6125XLG Blade Switches HP Enterprise Secure Key Manager HP LTO-6 Tape Drive HP Networking Switches HP Networking Switches HID Global ActivID Applet Suite v2.7.3 on Giesecke & Devrient Sm@rtCafé Expert 7.0 HID Global ActivID Applet Suite v2.7.3 on Oberthur Technologies Cosmo V8 CM1+ cocrypt CM1+ CM2 Dyadic Security Ltd ECI Telecom Ltd. EMC Corporation EROAD Limited F5 Networks, Inc. F5 Networks, Inc. FatPipe Inc. FireEye, Inc. FireEye, Inc. FireEye, Inc. Giesecke & Devrient GmbH Harris Corporation Harris Corporation Hewlett Packard Hewlett Packard Enterprise Hewlett Packard Enterprise Hewlett Packard Enterprise Company Hewlett Packard Enterprise Company Hewlett Packard Enterprise Development LP Hewlett Packard Enterprise Development LP HID Global and Giesecke & Devrient HID Global and Oberthur Technologies Hiddn Security AS Hiddn Security AS High Density Devices AS NIST CMVP 3 of 8 Updated: 1/25/2016

4 Hospira CE3.x OpenSSL Cryptographic Module Hospira HP StoreOnce Backup System HP Storage Voltage Cryptographic Module v.5.0 HPE Data Security Huawei FIPS Cryptographic Library (HFCL) Huawei Hypori ACE Device Hypori IBM(R) Security QRadar(R) Cryptographic Security Kernel IBM Corporation IBM Java JCE FIPS Cryptographic Module IBM Corportation IBM Security SiteProtector System Cryptographic Module IBM Security IBM Security XGS 3100, XGS 4100, XGS 5100, and XGS 7100 IBM Security Network Intrusion Prevention System (NIPS) IBM Security IBM LTO Generation 7 Encrypting Tape Drive IBM(R) Corporation IBM 4767 Cryptographic Coprocessor Security Module IBM Corporation Evolution e8350-fipsl2 Satellite Router [1], iconnex e800-fipsl2 Satellite Router Board [2], iconnex idirect Government e850mp-fipsl2 Satellite Router Board [3], Evolution em1d1-fipsl2 Line Card [4], and Evolution em0dm-fipsl2 Line Card [5] Imprivata FIPS Crypto Module v1.0 Imprivata, Inc. Trusted Platform Module 1.2 SLB 9660/SLB 9665/SLB 9670 Infineon Technologies AG IAS Router (IAS STEW, IAS KG-RU, and IAS Router MICRO models) Information Assurance Specialists, Inc. Integral AES 256 Bit Crypto SSD Underlying PCB Integral Memory PLC. Integral Crypto AES 256 Bit USB 3.0 Integral Memory PLC. INTEGRITY Security Services High Assurance Embedded Cryptographic Toolkit Integrity Security Services/Green Hills Software Cryptographic Module for Intel(R) vpro(tm) Platforms' Security Engine Chipset Intel Corporation Intel Rangeley Digital Random Number Generator Intel Corporation McAfee Linux Cryptographic Module Intel Corporation FIPS Crypto Module (FCM) Ionic Security Inc. datashur Pro istorage Limited Juniper Networks EX3300 and EX2200 Ethernet Switches Juniper Networks EX4300 and EX4600 Ethernet Switches Juniper Networks LN1000 and LN2600 Secure Routers Juniper Networks MX Series 3D Universal Edge Routers: MX 240, MX 480, MX 960, MX 2010 & MX 2020 with the Routing Engine 1800 Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Juniper Networks SRX1400, SRX3400, and SRX3600 Services Gateways Juniper Networks SRX5400, SRX5600, and SRX5800 Services Gateways MX Series 3D Universal Edge Routers with the Multiservice MS-MIC-16 and MS-MPC-128 Kaspersky Cryptographic Module (Kernel Mode) Kaspersky Lab UK Ltd. Kaspersky Cryptographic Module (Pre-Boot) Kaspersky Lab UK Ltd. NIST CMVP 4 of 8 Updated: 1/25/2016

5 Kaspersky Cryptographic Module (User Mode) Kaspersky Lab UK Ltd. Kingston DataTraveler DT4000 Series USB Flash Drive Kingston Technology Company, Inc esrvivr(r) Cockpit Voice and Flight Data Recorder (CVFDR) Encryption Module L-3 Communications, Aviation Recorders BC-FJA (Bouncy Castle FIPS Java API) Legion of the Bouncy Castle Inc. Lenovo Kernel Crypto API Library A for System x Lenovo Group Limited Lenovo Kernel Crypto API Library B for System x Lenovo Group Limited Lenovo OpenSSL Library for System x Lenovo Group Limited LG Framework Cryptographic Module LG Electronics, Inc. LG Kernel Cryptographic Module LG Electronics, Inc. LG OpenSSL Cryptographic Module LG Electronics, Inc. Monet 2.0 Marvell Semiconductor, Inc. McAfee Firewall Enterprise McAfee Network Security Platform NS-7100, NS-7200, NS-7300 Network Security Platform Sensor M-1250, M-1450, M-2750, M-2850, M-2950, M-3050, M-4050 and M Network Security Platform Sensor M-8000 P Network Security Platform Sensor M-8000 S Network Security Platform Sensor NS-9100 and NS-9200 Network Security Platform Sensor NS-9300 P Network Security Platform Sensor NS-9300 S BitLocker(R) Dump Filter (dumpfve.sys) in Microsoft Windows 10 Pro, Windows 10 Enterprise, Windows Microsoft Corporation 10 Enterprise LTSB BitLocker(R) Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Microsoft Corporation Enterprise, Windows 10 Enterprise LTSB BitLocker(R) Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Microsoft Corporation Enterprise, Windows 10 Enterprise LTSB Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise Microsoft Corporation LTSB Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Microsoft Corporation Enterprise LTSB Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Microsoft Corporation Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Microsoft Corporation Windows 10 Enterprise, Windows 10 Enterprise LTSB Secure Kernel Code Integrity (skci.dll) in Microsoft Windows 10 Enterprise, Windows 10 Enterprise LTSB Microsoft Corporation Proteus MX Cryptographic Module Microwave Networks Inc. Motorola GGM 8000 Gateway Motorola Solutions Systems Polska Sp. z o.o. Motorola Network Router (MNR) S6000 Motorola Solutions Systems Polska Sp. z o.o. Motorola Solutions Astro Subscriber umace - Level 2 Motorola Solutions, Inc. NIST CMVP 5 of 8 Updated: 1/25/2016

6 Motorola Solutions Astro Subscriber umace - Level 3 LX-4000T Series Console Servers NetApp Cryptographic Security Module v1.0 SR-OS Cryptographic Module NPCT6XX TPM 1.2 NPCT6XX TPM 2.0 Acme Packet 1100 and Acme Packet 3900 Acme Packet 4600 Acme Packet Virtual Machine Edition (VME) Oracle Solaris Kernel Cryptographic Framework Oracle Solaris Userland Cryptographic Framework Oracle StorageTek T10000D Tape Drive PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls PA-3060 and PA-7080 Firewalls Palo Alto Networks VM-Series WildFire WF-500 Panorama M-100/M-500 HSID5000 QTI Crypto Engine Core QTI Inline Crypto Engine (SDCC) QTI Inline Crypto Engine (UFS) QTI Pseudo Random Number Generator Alteon - Application Deliver Controller Series 5208/XX, 6420/XX, 8420/XX BreadCrumb LX4 BreadCrumb ME4 Cryptosec Dekaton Red Hat Enterprise Linux 6.6 Kernel Crypto API Cryptographic Module Red Hat Enterprise Linux 6.6 NSS Module Red Hat Enterprise Linux 7.1 GnuTLS Cryptographic Module Red Hat Enterprise Linux 7.1 Kernel Crypto API Cryptographic Module Red Hat Enterprise Linux 7.1 Libgcrypt Cryptographic Module Red Hat Enterprise Linux 7.1 Libreswan Cryptographic Module Red Hat Enterprise Linux 7.1 NSS Cryptographic Module Red Hat Enterprise Linux 7.1 OpenSSH Client Cryptographic Module Red Hat Enterprise Linux 7.1 OpenSSH Server Cryptographic Module RDL-3000 and elte-mt RS9113 Cryptographic Module Validation Program Motorola Solutions, Inc. MRV Communications, Inc. NetApp Nokia Corporation Nuvoton Technology Corporation Nuvoton Technology Corporation Palo Alto Networks Palo Alto Networks Palo Alto Networks Palo Alto Networks Palo Alto Networks, Inc. Parsec Qualcomm Technologies, Inc Qualcomm Technologies, Inc Qualcomm Technologies, Inc Qualcomm Technologies, Inc. Radware Ltd. Rajant Corporation Rajant Corporation Realia Technologies, S.L. Redline Communications Redpine Signals, Inc. NIST CMVP 6 of 8 Updated: 1/25/2016

7 VERN (TM) RMW Crypto Library Relocation Management Worldwide Samsung SCrypto Samsung Electronics Co., Ltd. Seagate Secure(R) TCG Enterprise SSC SSD Self-Encrypting Drive Seagate Technology LLC SecureParser Security First Corp. CN Series Ethernet Encryptors Senetas Corporation Ltd. and SafeNet Inc. CN1000/CN3000 Series Encryptors Senetas Corporation Ltd. and SafeNet Inc. CN6000 Series Encryptors Senetas Corporation Ltd. and SafeNet Inc. Teamcenter Cryptographic Module Siemens PLM Software Inc. Java Crypto Module Skyhigh Networks SBC 5110 and 5210 Session Border Controllers Sonus Networks, Inc. SBC 7000 Session Border Controller Sonus Networks, Inc. Xperia Cryptographic Module Sony Mobile Communications, Inc. SPYRUS USB-3 Module SPYRUS Inc. SPYCOS 3.0 QFN Spyrus, Inc. Spyrus MDTU-P384 Spyrus, Inc. SUSE Linux Enterprise Server 12 - Kernel Crypto API Cryptographic Module SUSE, LLC SUSE Linux Enterprise Server 12 - NSS Module SUSE, LLC Symantec Messaging Gateway Cryptographic Module Symantec Corporation Tanium Cryptographic Module Tanium, Inc. TCS Galatea 2 Serial ATA (SATA) Solid State Drive (SSD) TeleCommunication Systems (TCS) Datacryptor 100M Ethernet Thales e-security Datacryptor Gig Ethernet and 10 Gig Ethernet Thales e-security MiniHSM [1], MiniHSM for nshield Edge [2] and MiniHSM for Time Stamp Master Clock [3] MiniHSM [1], MiniHSM for nshield Edge [2] and MiniHSM for Time Stamp Master Clock [3] nshield F [1], nshield F [2] and nshield F [3] nshield F2 6000e [1], nshield F2 1500e [2], nshield F2 500e [3] and nshield F2 10e [4] nshield F3 10+ [1], nshield F [2], nshield F [3], nshield F for nshield Connect+ [4], nshield F for nshield Connect+ [5] and nshield F for nshield Connect+ [6] nshield F3 10+ [1], nshield F [2], nshield F [3], nshield F for nshield Connect+ [4], nshield F for nshield Connect+ [5] and nshield F for nshield Connect+ [6] nshield F3 6000e [1], nshield F3 1500e [2], nshield F3 500e [3], nshield F3 10e [4], nshield F3 6000e for nshield Connect [5], nshield F3 1500e for nshield Connect [6] and nshield F3 500e for nshield Connect [7] nshield Solo XC F2 nshield Solo XC F3 [1] and nshield Solo XC F3 for nshield Connect XC [2] nshield Solo XC F3 [1] and nshield Solo XC F3 for nshield Connect XC [2] nshield Remote Administration Token Thales e-security Ltd. ntoken Thales-eSecurity Inc. NIST CMVP 7 of 8 Updated: 1/25/2016

8 Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module Unisys Linux Kernel Cryptographic API Module SafeGuard CryptoServer CSe Vaultive Cryptographic Module VeloCloud Cryptographic Security Module Viptela Cryptographic Module V-Key Cryptographic Module VMware Horizon JCE (Java Cryptographic Extension) Module Vocera Cryptographic Module v3.0 Vormetric Data Security Manager Module Vormetric Data Security Manager Virtual Appliance Module WatchGuard Firebox M200, M300, M400, M500, M440, M4600, M5600 WatchGuard Firebox T10, T10-W, T30, T30-W, T50, T50-W C Crypto Module v2.0 XTec Cryptographic Module HSM-ZJ2014 ZBR-88W8787-WLAN R Series Data Comm II Cryptographic Module Validation Program Ultra Electronics AEP Unisys Corporation Utimaco Safeware AG Vaultive, Inc. VeloCloud Networks Inc. Viptela, Inc. V-Key VMware, Inc. Vocera Communications, Inc. Vormetric Inc. Vormetric Inc. WatchGuard Technologies, Inc. WatchGuard Technologies, Inc. Websense XTec, Inc. Zanjia Electronic Science & Technology (Beijing) Co., LTD Zebra Technologies, Corp. ZOLL Medical Corporation Displayed: Not Displayed: Total: NIST CMVP 8 of 8 Updated: 1/25/2016

Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List

Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List 40- and FIPS 40-2 Modules In Process List Updated 4/27/205 SoftAX A0 Networks, Thunder 4435S TPS, 4435 TPS, 5435 TPS, 5435S TPS, 6435 TPS and 6435S TPS A0 Networks, Thunder Series Application Delivery

More information

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List

Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Modules In Process List 40- and FIPS 40-2 Modules In Process List Updated 6/25/200 3e-525A-3, 3e-525A-3EP, 3e-525A-3MP, 3e-525V-3 and 3e-525Ve-4 AirGuardÖ 3e Technologies International, Inc. Wireless Access Points 3e-523-F2 and

More information

SNMP Collector Supported Device Inventory

SNMP Collector Supported Device Inventory Acme Acme Packet SD-3820 Border Controller Alcatel Bluecoat Alcatel 6850 BLUE COAT AV2400 / State of Device Utilization QoS Utilization QoS Subsystem Backplane Module 1.4 BLUE COAT AV510 Lan/Wan BLUE COAT

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

OceanStor VTL Solution V100R001 Interoperability Matrix

OceanStor VTL Solution V100R001 Interoperability Matrix OceanStor Solution V100R001 Interoperability Matrix Issue 1.0 Date 2016-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server

More information

Global IT Networks Skills Matrix

Global IT Networks Skills Matrix Global IT Networks Skills Matrix Server Core Infrastructure and Management Windows Server (all versions) SQL (Infrastructure) SQL (DBA) Active Directory Active Directory Certificate s Active Directory

More information

Hardware and Software Interoperability Matrix

Hardware and Software Interoperability Matrix Hardware and Software Interoperability Matrix This document provides interoperability matrices for Cisco Unified Computing components and configurations that have been tested and validated by Cisco, by

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft)

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES

BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES BLADESYSTEM FIRMWARE UPDATES BEST PRACTICES Session 3547 Greg Fields Hewlett Packard Account Support Manager Minneapolis, Minnesota 2011 Hewlett-Packard Development

More information

Delivery Method Chart: Replacement Parts and Installation of Integrated Software Updates

Delivery Method Chart: Replacement Parts and Installation of Integrated Software Updates Delivery Method Chart: Replacement Parts and Installation of Table of Contents Overview:... 3 Replacement Parts Delivery Method... 3 Delivery Method... 3 Oracle Desktop and Thin Client... 4 Sun Desktop...

More information

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper

More information

Commonwealth of Virginia Security and Search Network Appliances. IFB 2015-02 - Exhibit E - Pricing. Product Price List. phone: (301)670-0381 email:

Commonwealth of Virginia Security and Search Network Appliances. IFB 2015-02 - Exhibit E - Pricing. Product Price List. phone: (301)670-0381 email: IFB 201502 Exhibit E Pricing Product Price List Supplier Name: DALY COMPUTERS, INC. Submitted By: JEFF DI BELLA phone: (301)6700381 email: VASALES@DALY.COM NOTE: Authorized Contract Users must request

More information

address) : (True IP Address)

address) : (True IP Address) : WiFi : : (2010 83 ) ( ) : : (True IP Address) (Intranet address) : (True IP Address) : : : : : WiFi : : WiFi : WiFi 1. Please provide the detail of the access portal on: - Hardware configuration - Operating

More information

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Brochure More information from http://www.researchandmarkets.com/reports/45717/ Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Description: Firewalls are an integral part of any

More information

PRESIDIO MANAGED SERVICES OVERVIEW

PRESIDIO MANAGED SERVICES OVERVIEW OVERVIEW VALUE AND COMMITMENT OUR COMMITMENT In our pursuit of excellence for Managed Services we dedicate our team to support the strategic business and IT drivers from our customers. Enabling you to

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

Competitive Replacement Program: Product Matrix

Competitive Replacement Program: Product Matrix Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW Summary Purpose Business Value Product Type Technical function/certifications Product Family Name 1 General purpose Hardware Security Modules (HSMs) To securely protect cryptographic keys wherever they

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Network Industry Trends

Network Industry Trends Network Industry Trends Friday October 24, 2008 Dennis Smith The Bank of New York Mellon First Vice President Infrastructure Advanced Engineering Agenda The Bank of New York Mellon History of the Network

More information

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM

More information

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement Service Description Remote Consulting Service Introduction to your service agreement Remote ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services ). Each RCS

More information

Fujitsu PRIMERGY Servers Portfolio

Fujitsu PRIMERGY Servers Portfolio Fujitsu Servers Portfolio Complete server solutions that drive your success shaping tomorrow with you Higher IT efficiency and reduced total cost of ownership Fujitsu Micro and Tower Servers MX130 S2 TX100

More information

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security

More information

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp. Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce

More information

Customer Advantage Program

Customer Advantage Program Customer Advantage Program Straightforward upgrades and competitive trade-ins for Dell Security customers The Dell Security Customer Advantage Program offers an upgrade path from current Dell SonicWALL

More information

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee

More information

QuickSpecs. HP Library and Tape Tools. Features & Benefits. HP Library and Tape Tools. Overview

QuickSpecs. HP Library and Tape Tools. Features & Benefits. HP Library and Tape Tools. Overview Overview (L&TT) is a free, robust diagnostic tool for HP StoreEver Tape Family. Targeted for a wide range of users, it is ideal for customers who want to verify their installation, ensure product reliability,

More information

Cisco License Manager 3.1

Cisco License Manager 3.1 Product Bulletin Cisco License Manager 3.1 Last Updated: May 2011 Cisco announces Cisco License Manager 3.1 for managing Cisco IOS Software activation and license management for a wide range of Cisco platforms

More information

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions

More information

Device Adapter Capabilities Report

Device Adapter Capabilities Report Device Adapter Capabilities Report Page 1 of 19 Span Custom 3Com 4500 3Com 4500 3.02 and 3Com SuperStack 3 3Com SuperStack 3Com 3200, 3800, 3.12 and 4200, 4400, 4900 3Com 1100, 3300 2.7 and 3Com 3Com 50

More information

SonicWALL Customer Advantage Program Secure Upgrade Plus and Customer Loyalty Bundle Terms and Conditions

SonicWALL Customer Advantage Program Secure Upgrade Plus and Customer Loyalty Bundle Terms and Conditions The following terms and conditions apply to the Customer Advantage Program Secure Upgrade Plus To qualify for Secure Upgrade Plus, the participant must be the legal Owner of the Eligible Product or Eligible

More information

AEP Systems. Federal PKI Technical Working Group June 2003

AEP Systems. Federal PKI Technical Working Group June 2003 AEP Systems Federal PKI Technical Working Group June 2003 Company Background Founded: 1998 Employees: 62 The marriage of two companies: Baltimore Technologies Hardware Group (Zergo) (Security) AEP Systems

More information

IVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE:

IVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE: IVAN WINDON - CCENT 5295 S Netherland Way, Centennial, CO 80015 720.258.6311 c https://www.l3pdu.com ivan.windon@l3pdu.com NETWORK / SYSTEMS ADMINISTRATOR Solutions-focused IT professional driven to advance

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

SUSE Linux Enterprise 12 Security Certifications

SUSE Linux Enterprise 12 Security Certifications SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security thomas@suse.com 2 Evaluation Validation

More information

It is by bringing the best IT skills together in one place that can help your business meet current and future challenges.

It is by bringing the best IT skills together in one place that can help your business meet current and future challenges. The Vision. It is by bringing the best IT skills together in one place that can help your business meet current and future challenges. To be recognised as delivering exceptional business benefits to loyal

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

UN 4013 V - Virtual Tape Libraries solutions update...

UN 4013 V - Virtual Tape Libraries solutions update... UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,

More information

WNYRIC Standards List as of August, 2015

WNYRIC Standards List as of August, 2015 1. Computers Acer Apple Asus Tablet only Dell HP Lenovo Microsoft Nexlink Seneca Data-NNI Samsung Chromebook only Sony Toshiba Page 1 of 22 2. Communications Equipment Routers/Switches Avaya-Nortel Systems

More information

Information Security Recommendation Report

Information Security Recommendation Report Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results

More information

Secure Upgrade Plus. Customer Advantage Program. Secure Upgrade Plus. Customer Loyalty Bundles. Address other business needs

Secure Upgrade Plus. Customer Advantage Program. Secure Upgrade Plus. Customer Loyalty Bundles. Address other business needs Secure Upgrade Plus Straightforward upgrades and competitive trade-ins for Dell SonicWALL customers Secure Upgrade Plus offers an upgrade path from current Dell SonicWALL products, as well as a trade-in

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Firewall Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc. Lexington, Massachusetts www.wintergreenresearch.com

More information

PrivateServer HSM Integration with Microsoft IIS

PrivateServer HSM Integration with Microsoft IIS PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document

More information

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com Agenda Evaluation

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Pulse Secure Desktop Client Supported Platforms Guide

Pulse Secure Desktop Client Supported Platforms Guide Pulse Secure Desktop Client Platforms Guide Pulse Secure Desktop Client v5.1 For more information on this product, go to www.pulsesecure.net/products. Product Release Published Document Version 5.1R5 October

More information

Pulse Secure Desktop Client

Pulse Secure Desktop Client Pulse Secure Desktop Client Platforms Guide Product Release 5.1 Document Revision 2.0 Published: 2015-02-25 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200

More information

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement Service Description Remote Consulting Service Introduction to your service agreement Remote Consulting Services ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services

More information

Cloud on TEIN Part I: OpenStack Cloud Deployment. Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University

Cloud on TEIN Part I: OpenStack Cloud Deployment. Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University Cloud on TEIN Part I: OpenStack Cloud Deployment Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University Outline Objectives Part I: OpenStack Overview How OpenStack

More information

NetBrain Workstation 6.0

NetBrain Workstation 6.0 Live Discovery: NetBrain can discover and map any SNMP reachable device. Device Vendor and Type Support Level Provided Tier 1 Tier 2 Tier 3 Router Alcatel Lucent Service Router Yes Yes Yes Cisco IOS Router

More information

Junos Pulse Supported Platforms Guide

Junos Pulse Supported Platforms Guide Junos Pulse Platforms Guide 5.0R1 November 2013 Contents Introduction........................................................ 2 Documentation...................................................... 2 Hardware

More information

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000 RSA Security RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI RSA BSAFE 5 Web RSA SecurID 4000 EMC Security Strategy 1 Assess Risk EMC Infoscape Discovery Solutions EMC TS Security Practice EMC Services

More information

13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America

13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America VMware, Inc. VMware Kernel Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared by: VMware, Inc. 3401

More information

WHY TIGERDIRECT BUSINESS?

WHY TIGERDIRECT BUSINESS? WHY TIGERDIRECT BUSINESS? TigerDirect is a subsidiary of Systemax Inc. a Fortune 1000 company (NYSE: SYX). Systemax is a leading provider of IT solutions and products and industrial products to businesses

More information

Symantec NetBackup Enterprise Server and Server 7.0-7.6.x Hardware Compatibility List

Symantec NetBackup Enterprise Server and Server 7.0-7.6.x Hardware Compatibility List Symantec NetBackup Server and Server 7.0-7.6.x Hardware Compatibility List Created on April 03, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and NetBackup

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

Microsoft Azure Configuration

Microsoft Azure Configuration Microsoft Azure Configuration Azure Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 VNS3 Configuration Document

More information

APPENDIX C PRICING INDEX DIR-TSO-2540

APPENDIX C PRICING INDEX DIR-TSO-2540 Product Category MSRP DIR Customer from MSRP [or Firm Fixed Price] Systems Hardware and Software Global Price List See Note 1 See Note 3 Oracle E-business Component Applications Global Price List Oracle

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Smart Card Technology Capabilities

Smart Card Technology Capabilities Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards

More information

www.cosmetisuite.com 530-852-0306 Info@CosmetiSuite.com

www.cosmetisuite.com 530-852-0306 Info@CosmetiSuite.com Meditab - CosmetiSuite Cloud Hosting 1. System requirements 1.1 Workstations Workstations Workstations (Desktop/Laptop/Tablet PC) High-Usage Workstations (Provider/Critical Tasks) Component Minimum Specifications

More information

Utility Modernization Cyber Security City of Glendale, California

Utility Modernization Cyber Security City of Glendale, California Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased

More information

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Strong data protection. Strategic business value. www.thales-esecurity.com

Strong data protection. Strategic business value. www.thales-esecurity.com Someone is stalking your sensitive data. Coveting your intellectual property. Waiting for the slightest crack in the window of opportunity to hack it, misuse it, and run. How can you best protect and control

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Supported Platforms HPE Vertica Analytic Database. Software Version: 7.2.x

Supported Platforms HPE Vertica Analytic Database. Software Version: 7.2.x HPE Vertica Analytic Database Software Version: 7.2.x Document Release Date: 2/4/2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the

More information

Overland Storage Compatibility Guide

Overland Storage Compatibility Guide Overland Storage Compatibility Guide The Overland Software and Hardware Compatibility Guide lists which software and hardware have been tested for interoperability with all Overland products. Overland

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

AirWave 7.7. Server Sizing Guide

AirWave 7.7. Server Sizing Guide AirWave 7.7 Server Sizing Guide Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba

More information

Part-1: SERVER AND PC

Part-1: SERVER AND PC Part-1: SERVER AND PC Item Item Details Manufacturer Quantity Unit Price Total Dell server or equivalent Intel Xeon E5-2420 1.90GHz, 15M Cache, 7.2GT/s QPI, Turbo, 6C, 95W or equivalent PCIE Riser for

More information

Encrypting Data at Rest

Encrypting Data at Rest Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire

More information

OpenFlow/So+ware- defined Networks. Srini Seetharaman Clean Slate Lab Stanford University July 2010

OpenFlow/So+ware- defined Networks. Srini Seetharaman Clean Slate Lab Stanford University July 2010 OpenFlow/So+ware- defined Networks Srini Seetharaman Clean Slate Lab Stanford University July 2010 Outline MoFvaFon OpenFlow - Technical details Overall ecosystem Deployments We have lost our way RouFng,

More information

OpenFlow Technology Investigation Vendors Review on OpenFlow implementation

OpenFlow Technology Investigation Vendors Review on OpenFlow implementation OpenFlow Technology Investigation Vendors Review on OpenFlow implementation Ioan Turus, NORDUnet GN3 JRA1 T1&2, Copenhagen, 21.11.2012 Outline! Software Defined Networks (SDN)! Introduction to OpenFlow!

More information

INSTRUCTIONS. Product and Service Price List Worksheet Instructions

INSTRUCTIONS. Product and Service Price List Worksheet Instructions INSTRUCTIONS Product and Service List Worksheet Instructions Respondents shall complete each tab within the pricing workbooks for each Category that they are proposing. All unit cost fields shall be populated

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and

More information

SYSTEM REQUIREMENTS Single User & Red River Software ASP Users (See Specific Info for Tills and/or Meters) are not Supported in RRS

SYSTEM REQUIREMENTS Single User & Red River Software ASP Users (See Specific Info for Tills and/or Meters) are not Supported in RRS SYSTEM REQUIREMENTS Single User & Red River Software ASP Users (See Specific Info for Tills and/or Meters) Microsoft Windows Vista Business or Ultimate (Vista Home Basic and Home Premium not Supported)

More information

How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On

How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information