NIAP CC Evaluation & Validation Scheme: Scheme Home. From the United States:
|
|
- Stuart Campbell
- 8 years ago
- Views:
Transcription
1 Pagina 1 di 5 The following information technology (IT) products and protection p evaluated and certified/validated in accordance with the provisi Common Criteria Evaluation and Validation Scheme and the Recognition Arrangement (CCRA). Products and profiles on thi evaluated at accredited and licensed/approved evaluation facilities one of the other countries participating in the CCRA for conformanc Criteria for IT Security Evaluation (ISO Standard 15408). Common Criteria certificates issued for IT products and protection p to the specific versions and releases of those products and profiles in conjunction with complete certification/validation reports. The applicable only to the IT product tested, operating under the co environment described in the certification/validation report. Further the certification/validation information must review the info certification/validation report and certificate to assess the impact o when using the certified/validated product in operating environmen tested environment; and is responsible for reviewing the tests app results to see if the testing conducted is "good enough" to meet thei Certificates are not endorsements of IT products or protection profil or any other organization that recognizes or gives effect to th warranty of the IT product or protection profile by NIST, NS organization that recognizes or gives effect to this certificate, is eit implied. The products are listed under the countries where the products we certified/validated. From the United States: NIAP Common Criteria Evaluation and Validation Scheme National Institute of Standards and Technology (NIST) National Security Agency (NSA) BMC Software PATROL Perform/Predict Version Check Point Software Technologies, Inc.
2 Pagina 2 di 5 Check Point FireWall-1 Version, Version 4.0 (SP 5) - Cisco Systems, Inc. Cisco PIX Firewall520 - Electronic Engineering Systems, Inc. (EES SuperNet 2000 EAL4/r1 - Finjan Software Incorporated Finjan SurfinGate Version 5.6 IBM Corporation IBM Cryptographic Security Chip for PC Clients Manufactured by ATMEL (AT90SP0801) ITT Industries Dragonfly Guard Model G1.2 Dragonfly Companion Version 3.02 Lucent Technologies Lucent Managed Firewall Version 3.0 Lucent Managed Firewall Version Market Central, Inc. SecureSwitch Dual Network Switch Model # Sharp Corporation Sharp Data Security Kit (AR-FR1/AR-FR2/AR-FR3) for Sharp Imager Family (FR-287, AR-337, AR-407, and AR-5 Silicon Graphics, Inc. IRIX Version
3 Pagina 3 di 5 Trusted IRIX/CMW Version Sun Microsystems SunScreen EFS 3.0 Revision B Routing Mode SunScreen EFS 3.0 Revision B Stealth Mode WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Voltaire Advanced Data Security 2in1 PC(TM) From Canada: Canadian Common Criteria Evaluation and Certification Scheme Communications Security Establishment (CSE) Bioscrypt Inc. Bioscrypt Enterprise for NT Logon, Version Entrust Technologies Inc. Entrust TrueDelete Version 4.0 SecureLogix Corporation Enterprise Telephony Management (ETM ) Platform Version Microsoft 2000/NT4, and Sun Microsystems Inc. Solaris 7/ TeleWall System Version 2.0 Signal 9 Solutions Conseal Private Desktop Firewall Version 1.4 WinMagic Inc. SecureDoc Disk Encryption Verison 2.0
4 Pagina 4 di 5 From the United Kingdom: UK ITSec Scheme Communications-Electronics Security Group (CESG) BorderWare Technologies Borderware Version Firewall Server Cisco Systems, Inc. Cisco Secure PIX Firewall CyberGuard Corporation CyberGuard Firewall for Unix Ware Release 4.3/KnightStar Pr Firewall 4.3 Entrust Technologies, Inc. Entrust/Authority from Entrust/PKI 5.1 Entrust/RA from Entrust/PKI 5.1 Fujitsu Limited Safegate Firewall Version MIS Europe Ltd. SeNTry 2020 Oracle Corporation Ltd. Oracle 8 Release (Certification Report No P106) Oracle 8i Release (Certification Report No P158) From France: Schema d'evaluationet Certification Francais Service Centralde la Securite des Systemes d'information (SCSSI)
5 Pagina 5 di 5 From Germany: Budesamt fur Sicherheitin der Informationstechnik (BSI) Bull S.A. and IBM Informationsysteme DeutschlandGmbH B1/EST-XVersion with AIX Version 4.3 Philips Semiconductors Hamburg Philips Smart Card Controller P8WE5032V0B From Australia and New Zealand: Australasian Information Security Evaluation Programme Defence Signals Directorate (Australia) Government Communications Security Bureau (New Zealand) Secure Computing Corporation Gauntlet Firewall Version 6.0 on SUN Solaris Version 2.8 Page content last updated June 10, 2002.
ISO 15408. The international IT security standard. Marcel Weinand. 049-228/9582-152 MarcelWeinand@bsi.bund.de. Marcel Weinand
The international IT security standard ISO 15408 1 049-228/9582-152 MarcelWeinand@bsi.bund.de History of IT-Security Criteria Canada CTCPEC 3 USA 93 2 US TCSEC 83, 85 Germany France UK Netherlands Federal
More informationUK IT SECURITY EVALUATION AND CERTIFICATION SCHEME
UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P149 CHECK POINT VPN-1/FIREWALL-1 Issue 1.0 January 2001 Crown Copyright 2001 Reproduction is authorised provided the report
More informationIntroduction to Computer Administration. System Administration
Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration
More informationCiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
More informationC13 - Establishing a Windows Baseline Mike Villegas
C13 - Establishing a Windows Baseline Mike Villegas Windows Security Baselines Presented by Miguel (Mike) O. Villegas, CISA, CISSP Session # C13 INTRODUCTION TO WINDOWS MICROSOFT BASELINE SECURITY ANALYZER
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007
More informationSequeLink Server for ODBC Socket
P RODUCT O VERVIEW Server for ODBC Socket Overview DataDirect is highly scalable, server-based middleware that gives you a complete platform for data connectivity. Common Servers offer the performance
More informationBSI - Federal Office for Information Security. Evaluation and Certification of IT Security Technology in Germany
Bernd Kowalski 27.10.2004 Folie 1 BSI - Federal Office for Information Security Evaluation and Certification of IT Security Technology in Germany The BSI - History, Tasks and Services Product Certification
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More informationMetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix MetaFrame Presentation Server 4.0 for Windows Information in this document is subject
More informationFirewall and VPN Top Level Selected Products: Directory & Buyer's Guide
Brochure More information from http://www.researchandmarkets.com/reports/45717/ Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Description: Firewalls are an integral part of any
More informationHardware Requirements
300-6400 Roberts Street Burnaby BC V5G 4C9 300-6400 Roberts Street Burnaby BC V5G 4C9 Hardware Requirements Version 5.2: Last revised May 5, 2005 Microsoft, Windows and the Windows logo are trademarks,
More informationChallenges in the Information Age
Federal Office for Information Security The Role of the BSI in the German IT-Security Market Challenges in the Information Age Office History, Tasks and Services Information & Awareness Programme Baseline
More informationComputer Security Criteria: Security Evaluations and Assessment
Computer Security Criteria: Security Evaluations and Assessment An Oracle White Paper July 2001 Software Powers the Internet This page intentionally left blank Computer Security Criteria and Security Evaluations
More informationCommon Criteria Evaluation for a Trusted Entrust/PKI
Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United
More informationCitrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4.
Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix Presentation Server 4.5 Copyright and Trademark Notice Information in this document is
More informationCertification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
More informationSmart Plug-in for Siebel
[SUPPORTED PLATFORMS GUIDE] Siebel SPI Version 04.00 Smart Plug-in for Siebel SUPPORTED PLATFORMS GUIDE This document contains information about all HP Software and Oracle s Siebel products and versions,
More informationArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
More informationproudly presents WinMagic s SecureDoc
Sumpfstrasse 32 6300 Zug Switzerland www.insinova.ch proudly presents WinMagic s SecureDoc Jens Albrecht, Dipl. El.-Ing. FH CEO Last modified 29. September 2010 Agenda insinova + WinMagic, References SecureDoc
More informationServer Access for Ex Libris Support. August 2015
Server Access for Ex Libris Support August 2015 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss.
More informationHOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: +49 9103 / 715-0 Fax: +49 9103 / 715-271 E-Mail: support@hobsoft.com Internet: www.hobsoft.com HOB Remote Desktop VPN Secure access for remote
More informationIP Strategy. Fred Logue IP Lawyer PhD, 1996 Trinity College Dublin Member of Irish and UK Law Societies, IAM300, Institute of Physics
Fred Logue IP Lawyer PhD, 1996 Trinity College Dublin Member of Irish and UK Law Societies, IAM300, Institute of Physics fred.logue@newmorningip.com +353 (0)1 254 2340 www.newmorningip.com @newmorningip
More informationOracle Application Customization For USA Based Software Consultant
Case Study Oracle Application Customization For USA Based Software Consultant [INfORmATION TEChNOLOgy CuSTOmIzATION IN ORACLE APPS ORACLE TEChNOLOgy PLATfORm] Client Overview About Client: The Client is
More informationUK IT SECURITY EVALUATION AND CERTIFICATION SCHEME
UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P166 CHECK POINT VPN-1/FireWall-1 Next Generation (NG) Issue 2.0 July 2003 Crown Copyright 2003 Reproduction is authorised
More informationIBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
More informationCertification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
More informationIdentity - Privacy - Security
Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy
More informationCertification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
More informationConfiguring an IPSec Tunnel between a Firebox & a Check Point FireWall-1
Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)
More informationIntegration for BMC Remedy Service Desk
Integration for BMC Remedy Service Desk User Guide Supporting Integration for BMC Remedy Service Desk 7.3.01 BMC Impact Manager 7.3.01 BMC Remedy Service Desk 7.3.01 BMC ProactiveNet Performance Management
More informationUsing hp OpenView Omniback II GUI Via Slow Remote Connections
hp OpenView Omniback II technical whitepaper Using hp OpenView Omniback II GUI Via Slow Remote Connections Using Omniback II GUI via slow remote connections Technical Whitepaper Table of Contents 1. Introduction...
More informationSafeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
More informationTelephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.1
Citrix EasyCall Gateway Telephony System Integrator s Guide for Bandwidth.com Citrix EasyCall Gateway 2.1 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
More informationSupporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
More informationDetecting a Hacking Attempt
Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6
More informationThe Security Testing and Metrics Group (CMVP, NIAP, and C&A)
The Security Testing and Metrics Group (CMVP, NIAP, and C&A) Ray Snouffer Manager, Security Testing and Metrics Group National Institute of Standards and Technology December 16, 2003 1 Security Testing
More informationTechnical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO6200605-01
Technical Document Creating a VPN GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO6200605-01 Contents Introduction 1 Supported Encryption and Authentication Methods 1 IP Addresses Used in Examples
More informationCertification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
More informationIntroducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED
Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational
More informationTelephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.2.1
Citrix EasyCall Gateway Telephony System Integrator s Guide for Bandwidth.com Citrix EasyCall Gateway 2.2.1 Copyright and Trademark Notice Use of the product documented in this guide is subject to your
More informationUsing BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
More informationTelephony System Integrator s Guide for ShoreTel. Citrix EasyCall Gateway 3.0
Citrix EasyCall Gateway Telephony System Integrator s Guide for ShoreTel Citrix EasyCall Gateway 3.0 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
More informationFall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
More informationSystem Requirements. SAS Profitability Management 2.21. Deployment
System Requirements SAS Profitability Management 2.2 This document provides the requirements for installing and running SAS Profitability Management. You must update your computer to meet the minimum requirements
More informationFirewall Architectures of E-Commerce
Firewall Architectures of E-Commerce EE657 Midterm Project Presentation Professor Hwang Andy Yan Four State-of-the-art Firewall Architectures Description of 4 solutions IBM enetwork Compaq AXENT s Raptor
More informationManaged Backup Service Supported Platforms
Managed Backup Service Supported Platforms 2 Managed Backup Service Supported Platforms Updated: 16 th September 2009 InTechnology Supported Platforms The Managed Backup Service supports the following
More informationShipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationMalaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT
More informationRequirements for Upgrading from MetaLib 3.13 to MetaLib 4. Version 4
Requirements for Upgrading from MetaLib 3.13 to MetaLib 4 Version 4 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse
More information2X HTML5 Gateway v10.6
2X HTML5 Gateway v10.6 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationRelease Bulletin EDI Products 5.2.1
Release Bulletin EDI Products 5.2.1 Document ID: DC00191-01-0521-01 Last revised: June, 2010 Copyright 2010 by Sybase, Inc. All rights reserved. Sybase trademarks can be viewed at the Sybase trademarks
More informationShipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 8.00b ()... 2 Director Management Console (console
More informationREXX-like Macro Language for UNIX and Windows
REXX-like Macro Language for UNIX and Windows Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 1230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail: sedit@treehouse.com
More informationCompatibility with Encryption Products
Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint
More informationGovernment Information Security System with ITS Product Pre-qualification
Government Information Security System with ITS Product Pre-qualification Wan S. Yi 1, Dongbum Lee 2, Jin Kwak 2, Dongho Won 1 1 Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong,
More informationCISCO PIX SECURITY APPLIANCE LICENSING
DATA SHEET CISCO PIX SECURITY APPLIANCE LICENSING The market-leading Cisco PIX Security Appliance Series supports a variety of licensing options, enabling businesses to select the capabilities that are
More informationCorporate Presentation
Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal
More informationConfiguration Audit & Control
The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration
More informationRelease: 1. ICASAS206A Detect and protect from spam and destructive software
Release: 1 ICASAS206A Detect and protect from spam and destructive software ICASAS206A Detect and protect from spam and destructive software Modification History Release Release 1 Comments This Unit first
More informationWindows Authentication on Microsoft SQL Server
Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication
More informationSAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration. Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team
SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team Prerequisites Required: Basic MDM knowledge Basic EP6 content management
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationThe Ultimate Authentication Technology
"USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology The Digital Identity Paradigm Network security and
More informationJohn Smith Prattville, AL career@hashbangsecurity.com
John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position
More informationDEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1
DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed
More informationMapping EventTracker Reports and Alerts To FISMA Requirements NIST SP 800-53 Revision 3 Prism Microsystems, August 2009
Mapping Reports and Alerts To FISMA Requirements NIST SP 800-53 Revision 3 Prism Microsystems, August 2009 Access Control AC-2 Account Management *Security: User Account disabled *Security: User Account
More informationMaybe it s time to add a new dimension to your UNIX Data Center? 1 -
Escala Smart Move Maybe it s time to add a new dimension to your UNIX Data Center? 1 - Cost control, constant rationalization of infrastructures, implementation of secure private cloud, acceleration of
More informationCisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered
More informationMQ Authenticate User Security Exit Overview
MQ Authenticate User Security Exit Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com Table of Contents 1INTRODUCTION...1
More informationBusiness Continuity/Disaster Recovery Test Plan. For the 2015. Futures Industry DR Test Exercise. CRCC DR and BCP Test Plan
DOCUMENT Código: PR PYO 002 Versión: 1.0 CRCC DR and BCP Test Plan Página 0 de 5 Business Continuity/Disaster Recovery Test Plan For the 2015 Futures Industry DR Test Exercise CRCC DR and BCP Test Plan
More informationSupported Configurations
ERP VERSION 6.0 Supported Configurations This document outlines the execution environments that NEC will support for the indicated versions of FlexProcess ERP throughout the lifecycle of this particular
More informationInfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers
InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices
More informationInformation Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 dbrewer@gammassl.co.uk Agenda Background and
More informationOracle EXAM - 1Z0-559. Oracle Virtual Desktop Infrastructure 3 Essentials. Buy Full Product. http://www.examskey.com/1z0-559.html
Oracle EXAM - 1Z0-559 Oracle Virtual Desktop Infrastructure 3 Essentials Buy Full Product http://www.examskey.com/1z0-559.html Examskey Oracle 1Z0-559 exam demo product is here for you to test the quality
More informationRésumé. ajcon alexander jahn Consulting
Résumé Leading Teams Project Management Teaching IT - Courses MS SQL Server Administration and Programming Development of Concepts for MS SQL Server Environments MS SQL Server Reporting Services MS SQL
More informationCompatibility Matrix BES12. September 16, 2015
Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile
More informationInformation Technology Services
Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University
More informationIBM Remote Lab Platform Citrix Setup Guide
Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in
More informationWinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
More informationUK IT SECURITY EVALUATION AND CERTIFICATION SCHEME DESCRIPTION OF THE SCHEME
UKSP 01 UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME UK Scheme Publication No 1 DESCRIPTION OF THE SCHEME Issue 4.0 February 2000 Crown Copyright 2000 This document must not be copied or distributed
More informationRelease Bulletin EDI Products 5.2
Release Bulletin EDI Products 5.2 Document ID: DC00191-01-0520-01 Last revised: December, 2009 Copyright 1992-2009 by Sybase, Inc. All rights reserved. Sybase trademarks can be viewed at the Sybase trademarks
More informationCommon Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se
More informationQTP Computing Laboratory Strategy
Introduction QTP Computing Laboratory Strategy Erik Deumens Quantum Theory Project 12 September 2001 From the beginning of its computer operations (1980-1982) QTP has worked from a strategy and an architecture
More informationkerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies
KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP
More informationBSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationInstallation & Configuration Guide
EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationTotal Security Solution System: @SECUREVISION Essential Security for Net Businesses
UDC 621.395.74:681.32.004.4 Total Security Solution System: @SECUREVISION Essential Security for Net Businesses VTakashi Ohgo (Manuscript received September 24, 2000) The numerous cases of cracking into
More informationInstallation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with
Installation Guide for use with Squid Web Proxy Cache Websense Enterprise Websense Web Security Suite v6.3.2 1996-2008, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.
More informationReplacing Sneaker Net with the Internet. DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT
Replacing Sneaker Net with the Internet DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT Problem Statement Paper Routing of Proposals Slow Opaque Financial Reporting Information
More informationCERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA
CERTIFIED SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CONTENT CC IN A NUTSHELL CC BACKGROUND AIM AND GOAL OF CC ADVANTAGES OF CC WHY DO WE RECOMMEND CC TO DEVELOPERS? WHEN IS CC THE RIGHT CHOICE?
More informationThis brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd.
This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. 1 Job Management Partner 1 Version 9 Availability Management
More informationContents. BMC Remedy AR System 7.5.00 Compatibility Matrix
Contents AR SYSTEM SERVER SUPPORTED HARDWARE PLATFORMS AND OPERATING SYSTEMS... 3 AR SYSTEM SERVER SUPPORTED DATABASES...3 JAVA SUPPORT... 4 AR SYSTEM MID-TIER SUPPORTED CONFIGURATIONS...5 AR SYSTEM CLIENT
More informationPlexView Advanced Reporting System and Advanced Reporting System with Advanced Traffic Collection Software Release Notice 255-400-203R9.6.3.
PlexView Advanced Reporting System and Advanced Reporting System with Advanced Traffic Collection Software Release Notice 255-400-203R9.6.3.1 Release 9.6.3.1 January 11, 2005 Lucent Technologies - Proprietary
More informationOpen Smart Card Infrastructure for Europe
Open Smart Card Infrastructure for Europe v2 Volume 8: Part 3-1: Authors: Security and Protection Profiles (Common Criteria Supporting Document) eesc TB3 Protection Profiles, Security Certification NOTICE
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationWindows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication
More information