OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

Size: px
Start display at page:

Download "OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT"

Transcription

1 SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved Page 1 of 12

2 About this document This document describes the features, testing and deployment requirements necessary to meet Foundation Grade Certification for Mobile Device Management security products. It is intended for vendors, system architects, developers, evaluation and technical staff operating within the security arena. Section 1 is suitable for all readers. It outlines the purpose of the security product and defines the scope of the Security Characteristic. Document history CESG may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Soft copy location: DiscoverID Version Date Description 0.8 May 2013 Initial Draft June 2013 Updates after internal review July 2013 Updates after external feedback August 2013 Updates after second internal review October 2013 Updates after review from Technical Director January 2014 Initial draft release 1.1 January 2015 Updated to only reference NIAP Protection Profile 1.2 April 2015 Updates following external feedback 1.3 June 2015 Updates following second external review Contact CESG This document is authorised by: Technical Director (Assurance), CESG. For queries about this document please contact: CPA Administration Team CESG, Hubble Road Cheltenham Gloucestershire GL51 0EX, UK cpa@cesg.gsi.gov.uk Tel: +44 (0) SECURITY CHARACTERISTIC: Mobile Device Management Page 2 of 12

3 Contents Section 1 Overview Introduction Mapping to the Common Criteria Protection Profile Product description Typical use cases Expected operating environment Compatibility Future enhancements... 6 Appendix A Common Criteria Protection Profile mappings... 7 A.1 Additional mandatory version 1.1 MDM PP requirements... 7 A.2 Additional mandatory version 2.0 MDM PP requirements... 8 A.2.1 Additional mandatory version 2.0 MDM Server PP requirements... 8 A.2.2 Additional mandatory version 2.0 MDM Agent PP requirements... 9 Appendix B Additional details for Foundation Grade certification B.1 Device features that cannot be managed by the MDM product Appendix C References Appendix D Glossary SECURITY CHARACTERISTIC: Mobile Device Management Page 3 of 12

4 Section 1 Overview 1.1 Introduction The NIAP Protection Profile for Mobile Device Management documents (references [b], [c], and [d]) describe a set of requirements for mobile devices that can be certified through the Common Criteria scheme. The document you are now reading is a Security Characteristic that: Provides a route to awarding a Foundation Grade Certification for MDM products, which already have CC certification. Highlights those requirements which are listed in the Protection Profile for Mobile Device Management as extended or optional, but which are mandatory in products that are to be successfully assessed against this Security Characteristic This Security Characteristic aligns with guidance from the UK Government s End User Devices (EUD) Security Framework [a]. 1.2 Mapping to the Common Criteria Protection Profile MDM products successfully certified via the Common Criteria against the Protection Profile for Mobile Device Management (either version 1.1 or 2.0) can be additionally awarded Foundation Grade Certification. This additional certification can be achieved by the product vendor providing CESG with the following details: Evidence to show that the CC assessment also successfully verified that the product met the extended Protection Profile requirements listed in Appendix A of this document. Other security-related information about the product, as described in Appendix B - in particular, the mobile devices supported by the MDM product and any features of those devices, which are required to be managed by this Security Characteristic, but which are not supported by one or more of the devices 1. Evidence to show that the MDM product uses appropriate OS APIs 2 (on supported mobile devices) to provide the required management of those devices, as defined in this document. A URL1, or equivalent public reference, that provides guidance to end users about how to securely provision, configure, operate, maintain and dispose of the product. This guidance should be clear, concise and focussed on security aspects, referencing other supporting documentation (such as installation guides, user manuals, etc) where necessary. Once CESG has confirmed the vendor s assertions and supporting information above, the product will be awarded a Foundation Grade Certification against this Security Characteristic. 1 This information will be made available via the CESG website. 2 It will not be possible to award Foundation Grade Certification where such APIs are provided by a platform supported by the MDM, but are not utilised by the MDM to manage the mandatory requirement associated with the feature. SECURITY CHARACTERISTIC: Mobile Device Management Page 4 of 12

5 1.3 Product description MDM solutions are designed to remotely administer, configure, and audit mobile devices deployed by an enterprise and comprise of three distinct components: the client software, residing on the mobile device the server software a communications protocol for messages between the device and server The MDM client software can be provided as part of the operating system, or provided by a third party. The purpose of the client is to enforce the configuration (including restrictions) and provide auditing information to the enterprise. The MDM server software can be provided by the device manufacturer or a third party. It allows an enterprise to push configuration policies, events (such as remote wipe) and remotely audit mobile devices. 1.4 Typical use cases The End User Devices Security Guidance [a] for each mobile platform provides guidance on the components required for a suitable deployment, including the requirement to make use of an appropriately assured Virtual Private Network (VPN) to protect all data in transit. MDM communications must be protected by an appropriately assured encryption overlay, such as the existing VPN tunnel (recommended) or a separate tunnel with the same level of assurance. When following this guidance in enterprise deployments, the MDM server is located in the presentation layer as illustrated in figure 1. The MDM can also be deployed on a suitably accredited cloud service. This could be provided through a fully managed Software as a Service (SaaS) offering or a departmentally administered solution through an Infrastructure as a Service (IaaS) offering. All cloud based deployments require network MDM communications to be protected to the same level of assurance as the protectively marked data that the device can hold. The diagram below illustrates a typical deployment. Figure 1 - Typical MDM deployment SECURITY CHARACTERISTIC: Mobile Device Management Page 5 of 12

6 1.5 Expected operating environment It is expected that the MDM client will be deployed on a suitably secured endpoint in a mobile environment (see reference [a] for guidance). As stated in section 1.4, the management communications between the MDM client and server must be protected via encapsulation in a suitably assured encryption overlay (e.g. VPN). 1.6 Compatibility The majority of mobile phone and tablet platforms have some integrated management capabilities which can be augmented with third party clients. MDM clients are only expected to be used on mobile platforms for which current CESG security risk management guidance exists (see reference [a]). Note: the MDM client is expected to be compatible with a mobile device configured to meet the CESG guidance. 1.7 Future enhancements CESG welcomes feedback and suggestions on possible enhancements to this Security Characteristic. SECURITY CHARACTERISTIC: Mobile Device Management Page 6 of 12

7 Appendix A Common Criteria Protection Profile mappings This appendix provides important mappings between this document and the NIAP Protection Profile for Mobile Device Management (reference [b]), for which there are two versions 1.1 and 2.0. There is a minor language difference between this document and the Protection Profile documents: where the Security Characteristic refers to an MDM Client, the Protection Profile uses the phrase MDM Agent. A.1 Additional mandatory version 1.1 MDM PP requirements An MDM product assessed against this version of the Protection Profile (reference [b]) needs to additionally meet the following optional requirements within [b] to achieve Foundation Grade Certification. FCS_IPSEC_EXT.1.2(1) and FCS_IPSEC_EXT.1.2(2): if IPsec is in scope, the selection must include tunnel mode. FMT_SMF.1.1(1): selections must include: 16: remove applications 18: install applications 28: enable/disable policy for [assignment: list of radios] 29: enable/disable policy for data transfer capabilities over [assignment: list of externally accessible hardware ports] Appropriate algorithm selections must also be included to match whichever of the cryptographic profile(s) the product claims compliance with (either the PRIME PSN end-state or PSN interim profile). These are summarised below: PP / EP Requirement PRIME PSN Interim FCS_CKM.1.1(2 & 4) FCS_COP.1.1(1 & 5) FIPS PUB 186-4, Digital Signature Standard (DSS), Appendix B.4 for ECDSA schemes Elliptic Curve Digital Signature Algorithm (ECDSA) Either of: FIPS PUB 186-4, Digital Signature Standard (DSS), Appendix B.3 for RSA schemes ANSI X , Appendix A.2.4 Using AES for RSA schemes RSA Digital Signature Algorithm (rdsa) FCS_COP.1.1(4 & 8) SHA-256 SHA-1 FCS_COP.1.1(2 & 6) HMAC-SHA-256 HMAC-SHA-1 FCS_IPSEC_EXT.1.4 AES-GCM-128 AES-CBC-128 FCS_IPSEC_EXT.1.5 IKEv2 IKEv1, with RFC 4304 for extended sequence numbers FCS_IPSEC_EXT.1.6 IKEv2, with AES-GCM-128 IKEv1, with AES-CBC-128 FCS_IPSEC_EXT.1.11 Group 19 Group 5 FCS_IPSEC_EXT.1.12 ECDSA RSA SECURITY CHARACTERISTIC: Mobile Device Management Page 7 of 12

8 A.2 Additional mandatory version 2.0 MDM PP requirements Version 2.0 of the MDM Protection Profile contains a number of changes, compared to 1.1, and has also been split into separate server and agent documents (references [c] and [d]). An MDM product assessed against this version of the Protection Profile needs to additionally meet the following optional requirements within those documents to achieve Foundation Grade Certification. It should also be noted that there are a small number of mandatory requirements in the version 2.0 Protection that are not considered essential to meet Foundation Grade. A.2.1 Additional mandatory version 2.0 MDM Server PP requirements The MDM server component of an MDM product must additionally meet the following optional requirements in [c] to achieve Foundation Grade Certification: FCS_IPSEC_EXT.1.3: if IPsec is in scope, the selections must include tunnel mode. FMT_SMF.1.1(1): the selections must include: 14: wipe Enterprise data 31: enable/disable policy for list of radios 32: enable/disable policy for data signalling over list of externally accessible hardware ports 33: enable/disable policy for list of protocols where the device acts as a server 48: enable/disable USB mass storage mode Appropriate algorithm selections must also be included to match whichever of the cryptographic profile(s) the product claims compliance with (either the PRIME PSN end-state profile or PSN interim profile). These are summarised below: PP / EP Requirement PRIME PSN Interim FCS_CKM.1.1 FIPS PUB 186-4, Digital Either of: Signature Standard (DSS), FIPS PUB 186-4, Digital Signature Appendix B.4 for ECDSA Standard (DSS), Appendix B.3 for RSA schemes schemes ANSI X , Appendix A.2.4 Using AES for RSA schemes FCS_COP.1.1(2) SHA-256 SHA-1 FCS_COP.1.1(3) Elliptic Curve Digital RSA Digital Signature Algorithm (rdsa) Signature Algorithm (ECDSA) FCS_COP.1.1(4) HMAC-SHA-256 HMAC-SHA-1 FCS_IPSEC_EXT.1.4 AES-GCM-128 AES-CBC-128 FCS_IPSEC_EXT.1.5 IKEv2 IKEv1, with RFC 4304 for extended sequence numbers FCS_IPSEC_EXT.1.6 IKEv2, with AES-GCM-128 IKEv1, with AES-CBC-128 FCS_IPSEC_EXT.1.11 Group 19 Group 5 FCS_IPSEC_EXT.1.13 ECDSA RSA SECURITY CHARACTERISTIC: Mobile Device Management Page 8 of 12

9 A.2.2 Additional mandatory version 2.0 MDM Agent PP requirements The MDM client component of an MDM product must additionally meet the following optional requirements in [d] to achieve Foundation Grade Certification: FAU_ALT_EXT.2.1: the selections must include: c: change in enrollment state d: failure to install an application from the MAS Server 1 e: failure to update an application from the MAS Server1 FMT_SMF_EXT.3.1: if the MDF PP selection is used, the following requirements in Table 8 in [d] must be met for columns 2 and 5: 22: enable/disable all data signalling over list of externally accessible hardware ports 25: enable data-at rest protection 26: enable removable media s data-at-rest protection 28: wipe Enterprise data 39: enable/disable USB mass storage mode 1 Only applicable if the MDM product supports the use of a MAS Server. SECURITY CHARACTERISTIC: Mobile Device Management Page 9 of 12

10 Appendix B Additional details for Foundation Grade certification Where a product is successfully assessed against this Security Characteristic, CESG will additionally make the following details available on its website: Which PP version (i.e. v1.1 or v2.0) was used in the associated CC evaluation List of mobile device types for which the MDM product was successfully evaluated for use with (via CC), also meeting the additional requirements of Appendix A in this document AND for which CESG platform guidance exists (see reference [a]). Any important features not implemented by the above mobile devices see B.1. URL to security-related guidance for the product, as described in section 1.2 If the version 2.0 profile is used, which selections are used by the product to meet FMT_SMF.1.1 (1), point 28, in [c]. Note: CESG considers the three selections here to be listed in decreasing order of preference. These details, which do not impact the applicability of the Foundation Grade Certification, are intended to provide useful additional security-related information to end users. The information should be provided by the vendor to CESG, along with appropriate supporting evidence (e.g. CC evaluation documentation) to allow the team to verify the details. B.1 Device features that cannot be managed by the MDM product It is possible a mobile device might not provide a feature that the MDM product is required to manage, due to platform and/or OS limitations of the device. Where this occurs, the MDM product can still be approved for use with the mobile device (due to not needing to manage the risks associated with an absent feature), but the details of any such device limitations need to be provided by the vendor. Important: If a mobile device provides a feature that needs to be managed and the MDM product fails to do so, the product will not be approved for use with the device. The example table below illustrates how these details (to be made available on the CESG website) should be provided to CESG, along with appropriate supporting evidence. PP requirement mandated by either the MDM PP or by CESG Reference Sub ref. Description Supported mobile device types Type A Type B Type C Type D FMT_SMF.1.1(1) 3 unenroll from management N/A N/A FMT_SMF.1.1(1) 29 enable/disable policy for [assignment: list of audio or visual collection devices] across MD SECURITY CHARACTERISTIC: Mobile Device Management Page 10 of 12 N/A - FMT_SMF.1.1(1) 48 enable/disable USB mass storage mode - N/A - For the purposes of clarity, the table only needs to cover requirements mandated by the PP and the additional requirements stated in Appendix A of this document and then only when there is at least one mobile device type (supported by the MDM) that does not implement the feature associated with the requirement. There can be multiple columns to represent the mobile device types the vendor wishes to claim support for. Each column may specify a specific device type (e.g. type, model and OS) or a range of types (i.e. to avoid duplicated column data for all the requirements listed). Each row will record one of three options for each supported mobile device types column, for the given requirement: Symbol Meaning Feature supported by mobile device platform and MDM uses the native feature via the appropriate OS level APIs As per section 1.2, an MDM solution must use OS level APIs on the mobile device to meet a requirement.) - Feature supported by mobile device platform but no OS level APIs exist to allow MDM to manage risks presented by feature N/A Feature is not present on mobile device s platform, so does not present any risks to be managed by MDM product

11 Appendix C References This document references the following resources. Label Title Location Notes [a] End User Devices Security Guidance [b] [c] [d] Protection Profile for Mobile Device Management Protection Profile for Mobile Device Management Extended Package for Mobile Device Management Agents Version 1.1, March Version 2.0, December 2014 Version 2.0, December 2014 SECURITY CHARACTERISTIC: Mobile Device Management Page 11 of 12

12 Appendix D Glossary The following definitions are used in this document. Term AP API CPA Enrolment MAS MDM OS PP Push Notification SC Security Characteristic VPN Definition Architectural Pattern Application Programming Interface Commercial Product Assurance. A scheme run by CESG providing certificate-based assurance of commercial security products. Creation of a trusted relationship between a mobile device and an MDM Server. Mobile Application Store Mobile Device Management Operating System Protection Profile Simple message sent from MDM Server to MDM client using Internet based data channel. Security Characteristic A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product. Virtual Private Network SECURITY CHARACTERISTIC: Mobile Device Management Page 12 of 12

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,

More information

CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE

CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE 12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Data Sanitisation - Flash Based Storage

More information

CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY

CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY Version 2.5 Crown Copyright 2016 All Rights Reserved 48770392 Page 1 of 25 About this document This document describes the features, testing and deployment

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy

More information

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT 26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment

More information

CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT 24419250 CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 2.1 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the

More information

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT 29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the

More information

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved. CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS Issue 1.1 Crown Copyright 2015 All Rights Reserved 1 of 9 Document History Version Date Description 0.1 November 2012 Initial Draft Version

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION

CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION UNCLASSIFIED 24426399 CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 UNCLASSIFIED Enterprise Management

More information

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Version 0.6 2015/05/08 Prepared for: Samsung SDS 123, Olympic-ro 35-gil, Songpa-gu, Seoul, Korea 138-240 Prepared By: www.gossamersec.com

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved 18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History

More information

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY 3166116 CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 MIKEY-SAKKE Secure VoIP gateway About this document This document

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management Protection Profile for Mobile Device Management 7 March 2014 Version 1.1 1 Revision History Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 March 2014 Typographical changes and clarifications

More information

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014

More information

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9)

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9) Assurance Activities Report for a Target of Evaluation Cisco Integrated Services Router (ISR) 800 Series Security Target (Version 0.9) Assurance Activities Report (AAR) Version 1.0 10/31/2014 Evaluated

More information

DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014

DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014 DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1 14 February 2014 Trademark Information Names, products, and services referenced within this document may be the trade

More information

Security Policy. Security Policy. www.clickmeeting.com

Security Policy. Security Policy. www.clickmeeting.com Security Policy www.clickmeeting.com 1 Introduction ClickMeeting is a worldwide, solid and easy to use SaaS platform. It s core was constructed with the hi-end technology. Data security the highest priority

More information

End User Devices Security Guidance: Apple OS X 10.10

End User Devices Security Guidance: Apple OS X 10.10 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

BlackBerry 10.3 Work Space Only

BlackBerry 10.3 Work Space Only GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Citrix Password Manager, Enterprise Edition Version 4.5

Citrix Password Manager, Enterprise Edition Version 4.5 122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright

More information

Samsung KNOX 2. UK Government EUD Guidance Whitepaper

Samsung KNOX 2. UK Government EUD Guidance Whitepaper Samsung KNOX 2 UK Government EUD Guidance Whitepaper December 2014 Copyright Notice Copyright 2014 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics

More information

PROCESS FOR PERFORMING COMMERCIAL PRODUCT ASSURANCE (CPA) FOUNDATION GRADE EVALUATIONS

PROCESS FOR PERFORMING COMMERCIAL PRODUCT ASSURANCE (CPA) FOUNDATION GRADE EVALUATIONS PROCESS FOR PERFORMING COMMERCIAL PRODUCT ASSURANCE (CPA) FOUNDATION GRADE EVALUATIONS Issue 2.4 SEPTEMBER 2014 Crown Copyright 2016 All Rights Reserved 41421324 Page 1 of 32 Foreword This document contains

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2012 IPsec VPN Client Security Target Document Information Version Number 1.0 Updated On January

More information

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows

More information

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64 122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction

More information

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved 11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish

More information

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

More information

UNCLASSIFIED 12686381

UNCLASSIFIED 12686381 12686381 CPA SECURITY CHARACTERISTIC IP FILTERING FIREWALLS Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for IP Filtering firewalls 26/07/2011 Document History Version

More information

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances 122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2009/58 17 September 2009 Version 1.0 Commonwealth of Australia 2009. Reproduction is authorised provided that

More information

Protection Profile for Network Devices

Protection Profile for Network Devices Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/70 23 November 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

SharePlus Enterprise: Security White Paper

SharePlus Enterprise: Security White Paper INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/66 10 Mar 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that the

More information

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented

Service NCPCLCFG is not running In this case, increase the WaitForConfigService setting until the problem is circumvented NCP Secure Client Juniper Edition Service Release: 9.30 Build 186 Date: July 2012 1. New Features and Enhancements The following describes the new feature introduced in this release: Configurable Service

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report 3eTI 3e-636 Series Network Security Devices Report Number: CCEVS-VR-VID10580 Dated: March 25,

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Cisco Intercloud Fabric Security Features: Technical Overview

Cisco Intercloud Fabric Security Features: Technical Overview White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

Payment Transactions Security & Enforcement

Payment Transactions Security & Enforcement Payment Transactions Security & Enforcement A REPORT FROM NEWNET COMMUNICATION TECHNOLOGIES, LLC Copyright NewNet Communication Technologies, LLC. 700 East Butterfield Road, Suite 350, Lombard, IL 60148

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

PSN compliant remote access Whitepaper

PSN compliant remote access Whitepaper PSN compliant remote access Whitepaper March 2015 www.celestix.com/directaccess DirectAccess and IPsec connectivity in the public sector Mobile working in the public sector is nothing new but in recent

More information

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 - Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC

More information

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service. i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement Get Better Protected...

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of

More information

2014 IBM Corporation

2014 IBM Corporation 2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session

More information

Security Requirements for Network Devices

Security Requirements for Network Devices Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM

More information

How To Test A Toe For Security

How To Test A Toe For Security Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cpp September-2014 Version 0.1 CCDB- Foreword This is a supporting

More information

Policy and Profile Reference Guide

Policy and Profile Reference Guide BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1 Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

A Comparison of Protocols for Device Management and Software Updates

A Comparison of Protocols for Device Management and Software Updates B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information