NIAP CC Evaluation & Validation Scheme: Scheme Home. From the United States:

Size: px
Start display at page:

Download "NIAP CC Evaluation & Validation Scheme: Scheme Home. From the United States:"

Transcription

1 Pagina 1 di 5 The following information technology (IT) products and protection p evaluated and certified/validated in accordance with the provisi Common Criteria Evaluation and Validation Scheme and the Recognition Arrangement (CCRA). Products and profiles on thi evaluated at accredited and licensed/approved evaluation facilities one of the other countries participating in the CCRA for conformanc Criteria for IT Security Evaluation (ISO Standard 15408). Common Criteria certificates issued for IT products and protection p to the specific versions and releases of those products and profiles in conjunction with complete certification/validation reports. The applicable only to the IT product tested, operating under the co environment described in the certification/validation report. Further the certification/validation information must review the info certification/validation report and certificate to assess the impact o when using the certified/validated product in operating environmen tested environment; and is responsible for reviewing the tests app results to see if the testing conducted is "good enough" to meet thei Certificates are not endorsements of IT products or protection profil or any other organization that recognizes or gives effect to th warranty of the IT product or protection profile by NIST, NS organization that recognizes or gives effect to this certificate, is eit implied. The products are listed under the countries where the products we certified/validated. From the United States: NIAP Common Criteria Evaluation and Validation Scheme National Institute of Standards and Technology (NIST) National Security Agency (NSA) BMC Software PATROL Perform/Predict Version Check Point Software Technologies, Inc.

2 Pagina 2 di 5 Check Point FireWall-1 Version, Version 4.0 (SP 5) - Cisco Systems, Inc. Cisco PIX Firewall520 - Electronic Engineering Systems, Inc. (EES SuperNet 2000 EAL4/r1 - Finjan Software Incorporated Finjan SurfinGate Version 5.6 IBM Corporation IBM Cryptographic Security Chip for PC Clients Manufactured by ATMEL (AT90SP0801) ITT Industries Dragonfly Guard Model G1.2 Dragonfly Companion Version 3.02 Lucent Technologies Lucent Managed Firewall Version 3.0 Lucent Managed Firewall Version Market Central, Inc. SecureSwitch Dual Network Switch Model # Sharp Corporation Sharp Data Security Kit (AR-FR1/AR-FR2/AR-FR3) for Sharp Imager Family (FR-287, AR-337, AR-407, and AR-5 Silicon Graphics, Inc. IRIX Version

3 Pagina 3 di 5 Trusted IRIX/CMW Version Sun Microsystems SunScreen EFS 3.0 Revision B Routing Mode SunScreen EFS 3.0 Revision B Stealth Mode WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Voltaire Advanced Data Security 2in1 PC(TM) From Canada: Canadian Common Criteria Evaluation and Certification Scheme Communications Security Establishment (CSE) Bioscrypt Inc. Bioscrypt Enterprise for NT Logon, Version Entrust Technologies Inc. Entrust TrueDelete Version 4.0 SecureLogix Corporation Enterprise Telephony Management (ETM ) Platform Version Microsoft 2000/NT4, and Sun Microsystems Inc. Solaris 7/ TeleWall System Version 2.0 Signal 9 Solutions Conseal Private Desktop Firewall Version 1.4 WinMagic Inc. SecureDoc Disk Encryption Verison 2.0

4 Pagina 4 di 5 From the United Kingdom: UK ITSec Scheme Communications-Electronics Security Group (CESG) BorderWare Technologies Borderware Version Firewall Server Cisco Systems, Inc. Cisco Secure PIX Firewall CyberGuard Corporation CyberGuard Firewall for Unix Ware Release 4.3/KnightStar Pr Firewall 4.3 Entrust Technologies, Inc. Entrust/Authority from Entrust/PKI 5.1 Entrust/RA from Entrust/PKI 5.1 Fujitsu Limited Safegate Firewall Version MIS Europe Ltd. SeNTry 2020 Oracle Corporation Ltd. Oracle 8 Release (Certification Report No P106) Oracle 8i Release (Certification Report No P158) From France: Schema d'evaluationet Certification Francais Service Centralde la Securite des Systemes d'information (SCSSI)

5 Pagina 5 di 5 From Germany: Budesamt fur Sicherheitin der Informationstechnik (BSI) Bull S.A. and IBM Informationsysteme DeutschlandGmbH B1/EST-XVersion with AIX Version 4.3 Philips Semiconductors Hamburg Philips Smart Card Controller P8WE5032V0B From Australia and New Zealand: Australasian Information Security Evaluation Programme Defence Signals Directorate (Australia) Government Communications Security Bureau (New Zealand) Secure Computing Corporation Gauntlet Firewall Version 6.0 on SUN Solaris Version 2.8 Page content last updated June 10, 2002.

ISO 15408. The international IT security standard. Marcel Weinand. 049-228/9582-152 MarcelWeinand@bsi.bund.de. Marcel Weinand

ISO 15408. The international IT security standard. Marcel Weinand. 049-228/9582-152 MarcelWeinand@bsi.bund.de. Marcel Weinand The international IT security standard ISO 15408 1 049-228/9582-152 MarcelWeinand@bsi.bund.de History of IT-Security Criteria Canada CTCPEC 3 USA 93 2 US TCSEC 83, 85 Germany France UK Netherlands Federal

More information

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P149 CHECK POINT VPN-1/FIREWALL-1 Issue 1.0 January 2001 Crown Copyright 2001 Reproduction is authorised provided the report

More information

Introduction to Computer Administration. System Administration

Introduction to Computer Administration. System Administration Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

C13 - Establishing a Windows Baseline Mike Villegas

C13 - Establishing a Windows Baseline Mike Villegas C13 - Establishing a Windows Baseline Mike Villegas Windows Security Baselines Presented by Miguel (Mike) O. Villegas, CISA, CISSP Session # C13 INTRODUCTION TO WINDOWS MICROSOFT BASELINE SECURITY ANALYZER

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007

More information

SequeLink Server for ODBC Socket

SequeLink Server for ODBC Socket P RODUCT O VERVIEW Server for ODBC Socket Overview DataDirect is highly scalable, server-based middleware that gives you a complete platform for data connectivity. Common Servers offer the performance

More information

BSI - Federal Office for Information Security. Evaluation and Certification of IT Security Technology in Germany

BSI - Federal Office for Information Security. Evaluation and Certification of IT Security Technology in Germany Bernd Kowalski 27.10.2004 Folie 1 BSI - Federal Office for Information Security Evaluation and Certification of IT Security Technology in Germany The BSI - History, Tasks and Services Product Certification

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix MetaFrame Presentation Server 4.0 for Windows Information in this document is subject

More information

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Brochure More information from http://www.researchandmarkets.com/reports/45717/ Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Description: Firewalls are an integral part of any

More information

Hardware Requirements

Hardware Requirements 300-6400 Roberts Street Burnaby BC V5G 4C9 300-6400 Roberts Street Burnaby BC V5G 4C9 Hardware Requirements Version 5.2: Last revised May 5, 2005 Microsoft, Windows and the Windows logo are trademarks,

More information

Challenges in the Information Age

Challenges in the Information Age Federal Office for Information Security The Role of the BSI in the German IT-Security Market Challenges in the Information Age Office History, Tasks and Services Information & Awareness Programme Baseline

More information

Computer Security Criteria: Security Evaluations and Assessment

Computer Security Criteria: Security Evaluations and Assessment Computer Security Criteria: Security Evaluations and Assessment An Oracle White Paper July 2001 Software Powers the Internet This page intentionally left blank Computer Security Criteria and Security Evaluations

More information

Common Criteria Evaluation for a Trusted Entrust/PKI

Common Criteria Evaluation for a Trusted Entrust/PKI Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United

More information

Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4.

Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4. Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix Presentation Server 4.5 Copyright and Trademark Notice Information in this document is

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications

More information

Smart Plug-in for Siebel

Smart Plug-in for Siebel [SUPPORTED PLATFORMS GUIDE] Siebel SPI Version 04.00 Smart Plug-in for Siebel SUPPORTED PLATFORMS GUIDE This document contains information about all HP Software and Oracle s Siebel products and versions,

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

proudly presents WinMagic s SecureDoc

proudly presents WinMagic s SecureDoc Sumpfstrasse 32 6300 Zug Switzerland www.insinova.ch proudly presents WinMagic s SecureDoc Jens Albrecht, Dipl. El.-Ing. FH CEO Last modified 29. September 2010 Agenda insinova + WinMagic, References SecureDoc

More information

Server Access for Ex Libris Support. August 2015

Server Access for Ex Libris Support. August 2015 Server Access for Ex Libris Support August 2015 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss.

More information

HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network

HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: +49 9103 / 715-0 Fax: +49 9103 / 715-271 E-Mail: support@hobsoft.com Internet: www.hobsoft.com HOB Remote Desktop VPN Secure access for remote

More information

IP Strategy. Fred Logue IP Lawyer PhD, 1996 Trinity College Dublin Member of Irish and UK Law Societies, IAM300, Institute of Physics

IP Strategy. Fred Logue IP Lawyer PhD, 1996 Trinity College Dublin Member of Irish and UK Law Societies, IAM300, Institute of Physics Fred Logue IP Lawyer PhD, 1996 Trinity College Dublin Member of Irish and UK Law Societies, IAM300, Institute of Physics fred.logue@newmorningip.com +353 (0)1 254 2340 www.newmorningip.com @newmorningip

More information

Oracle Application Customization For USA Based Software Consultant

Oracle Application Customization For USA Based Software Consultant Case Study Oracle Application Customization For USA Based Software Consultant [INfORmATION TEChNOLOgy CuSTOmIzATION IN ORACLE APPS ORACLE TEChNOLOgy PLATfORm] Client Overview About Client: The Client is

More information

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P166 CHECK POINT VPN-1/FireWall-1 Next Generation (NG) Issue 2.0 July 2003 Crown Copyright 2003 Reproduction is authorised

More information

IBM Tivoli Remote Control

IBM Tivoli Remote Control Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

Identity - Privacy - Security

Identity - Privacy - Security Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy

More information

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification

More information

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)

More information

Integration for BMC Remedy Service Desk

Integration for BMC Remedy Service Desk Integration for BMC Remedy Service Desk User Guide Supporting Integration for BMC Remedy Service Desk 7.3.01 BMC Impact Manager 7.3.01 BMC Remedy Service Desk 7.3.01 BMC ProactiveNet Performance Management

More information

Using hp OpenView Omniback II GUI Via Slow Remote Connections

Using hp OpenView Omniback II GUI Via Slow Remote Connections hp OpenView Omniback II technical whitepaper Using hp OpenView Omniback II GUI Via Slow Remote Connections Using Omniback II GUI via slow remote connections Technical Whitepaper Table of Contents 1. Introduction...

More information

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49. Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security

More information

Telephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.1

Telephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.1 Citrix EasyCall Gateway Telephony System Integrator s Guide for Bandwidth.com Citrix EasyCall Gateway 2.1 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2. Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

The Security Testing and Metrics Group (CMVP, NIAP, and C&A)

The Security Testing and Metrics Group (CMVP, NIAP, and C&A) The Security Testing and Metrics Group (CMVP, NIAP, and C&A) Ray Snouffer Manager, Security Testing and Metrics Group National Institute of Standards and Technology December 16, 2003 1 Security Testing

More information

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO6200605-01

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO6200605-01 Technical Document Creating a VPN GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO6200605-01 Contents Introduction 1 Supported Encryption and Authentication Methods 1 IP Addresses Used in Examples

More information

Certification Report

Certification Report Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational

More information

Telephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.2.1

Telephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.2.1 Citrix EasyCall Gateway Telephony System Integrator s Guide for Bandwidth.com Citrix EasyCall Gateway 2.2.1 Copyright and Trademark Notice Use of the product documented in this guide is subject to your

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Telephony System Integrator s Guide for ShoreTel. Citrix EasyCall Gateway 3.0

Telephony System Integrator s Guide for ShoreTel. Citrix EasyCall Gateway 3.0 Citrix EasyCall Gateway Telephony System Integrator s Guide for ShoreTel Citrix EasyCall Gateway 3.0 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

System Requirements. SAS Profitability Management 2.21. Deployment

System Requirements. SAS Profitability Management 2.21. Deployment System Requirements SAS Profitability Management 2.2 This document provides the requirements for installing and running SAS Profitability Management. You must update your computer to meet the minimum requirements

More information

Firewall Architectures of E-Commerce

Firewall Architectures of E-Commerce Firewall Architectures of E-Commerce EE657 Midterm Project Presentation Professor Hwang Andy Yan Four State-of-the-art Firewall Architectures Description of 4 solutions IBM enetwork Compaq AXENT s Raptor

More information

Managed Backup Service Supported Platforms

Managed Backup Service Supported Platforms Managed Backup Service Supported Platforms 2 Managed Backup Service Supported Platforms Updated: 16 th September 2009 InTechnology Supported Platforms The Managed Backup Service supports the following

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia

Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT

More information

Requirements for Upgrading from MetaLib 3.13 to MetaLib 4. Version 4

Requirements for Upgrading from MetaLib 3.13 to MetaLib 4. Version 4 Requirements for Upgrading from MetaLib 3.13 to MetaLib 4 Version 4 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse

More information

2X HTML5 Gateway v10.6

2X HTML5 Gateway v10.6 2X HTML5 Gateway v10.6 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Release Bulletin EDI Products 5.2.1

Release Bulletin EDI Products 5.2.1 Release Bulletin EDI Products 5.2.1 Document ID: DC00191-01-0521-01 Last revised: June, 2010 Copyright 2010 by Sybase, Inc. All rights reserved. Sybase trademarks can be viewed at the Sybase trademarks

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 8.00b ()... 2 Director Management Console (console

More information

REXX-like Macro Language for UNIX and Windows

REXX-like Macro Language for UNIX and Windows REXX-like Macro Language for UNIX and Windows Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 1230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail: sedit@treehouse.com

More information

Compatibility with Encryption Products

Compatibility with Encryption Products Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint

More information

Government Information Security System with ITS Product Pre-qualification

Government Information Security System with ITS Product Pre-qualification Government Information Security System with ITS Product Pre-qualification Wan S. Yi 1, Dongbum Lee 2, Jin Kwak 2, Dongho Won 1 1 Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong,

More information

CISCO PIX SECURITY APPLIANCE LICENSING

CISCO PIX SECURITY APPLIANCE LICENSING DATA SHEET CISCO PIX SECURITY APPLIANCE LICENSING The market-leading Cisco PIX Security Appliance Series supports a variety of licensing options, enabling businesses to select the capabilities that are

More information

Corporate Presentation

Corporate Presentation Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

Release: 1. ICASAS206A Detect and protect from spam and destructive software

Release: 1. ICASAS206A Detect and protect from spam and destructive software Release: 1 ICASAS206A Detect and protect from spam and destructive software ICASAS206A Detect and protect from spam and destructive software Modification History Release Release 1 Comments This Unit first

More information

Windows Authentication on Microsoft SQL Server

Windows Authentication on Microsoft SQL Server Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication

More information

SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration. Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team

SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration. Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team Prerequisites Required: Basic MDM knowledge Basic EP6 content management

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

The Ultimate Authentication Technology

The Ultimate Authentication Technology "USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology The Digital Identity Paradigm Network security and

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1 DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed

More information

Mapping EventTracker Reports and Alerts To FISMA Requirements NIST SP 800-53 Revision 3 Prism Microsystems, August 2009

Mapping EventTracker Reports and Alerts To FISMA Requirements NIST SP 800-53 Revision 3 Prism Microsystems, August 2009 Mapping Reports and Alerts To FISMA Requirements NIST SP 800-53 Revision 3 Prism Microsystems, August 2009 Access Control AC-2 Account Management *Security: User Account disabled *Security: User Account

More information

Maybe it s time to add a new dimension to your UNIX Data Center? 1 -

Maybe it s time to add a new dimension to your UNIX Data Center? 1 - Escala Smart Move Maybe it s time to add a new dimension to your UNIX Data Center? 1 - Cost control, constant rationalization of infrastructures, implementation of secure private cloud, acceleration of

More information

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered

More information

MQ Authenticate User Security Exit Overview

MQ Authenticate User Security Exit Overview MQ Authenticate User Security Exit Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com Table of Contents 1INTRODUCTION...1

More information

Business Continuity/Disaster Recovery Test Plan. For the 2015. Futures Industry DR Test Exercise. CRCC DR and BCP Test Plan

Business Continuity/Disaster Recovery Test Plan. For the 2015. Futures Industry DR Test Exercise. CRCC DR and BCP Test Plan DOCUMENT Código: PR PYO 002 Versión: 1.0 CRCC DR and BCP Test Plan Página 0 de 5 Business Continuity/Disaster Recovery Test Plan For the 2015 Futures Industry DR Test Exercise CRCC DR and BCP Test Plan

More information

Supported Configurations

Supported Configurations ERP VERSION 6.0 Supported Configurations This document outlines the execution environments that NEC will support for the indicated versions of FlexProcess ERP throughout the lifecycle of this particular

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 dbrewer@gammassl.co.uk Agenda Background and

More information

Oracle EXAM - 1Z0-559. Oracle Virtual Desktop Infrastructure 3 Essentials. Buy Full Product. http://www.examskey.com/1z0-559.html

Oracle EXAM - 1Z0-559. Oracle Virtual Desktop Infrastructure 3 Essentials. Buy Full Product. http://www.examskey.com/1z0-559.html Oracle EXAM - 1Z0-559 Oracle Virtual Desktop Infrastructure 3 Essentials Buy Full Product http://www.examskey.com/1z0-559.html Examskey Oracle 1Z0-559 exam demo product is here for you to test the quality

More information

Résumé. ajcon alexander jahn Consulting

Résumé. ajcon alexander jahn Consulting Résumé Leading Teams Project Management Teaching IT - Courses MS SQL Server Administration and Programming Development of Concepts for MS SQL Server Environments MS SQL Server Reporting Services MS SQL

More information

Compatibility Matrix BES12. September 16, 2015

Compatibility Matrix BES12. September 16, 2015 Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile

More information

Information Technology Services

Information Technology Services Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University

More information

IBM Remote Lab Platform Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in

More information

WinMagic Encryption Software Installation and Configuration

WinMagic Encryption Software Installation and Configuration WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology

More information

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME DESCRIPTION OF THE SCHEME

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME DESCRIPTION OF THE SCHEME UKSP 01 UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME UK Scheme Publication No 1 DESCRIPTION OF THE SCHEME Issue 4.0 February 2000 Crown Copyright 2000 This document must not be copied or distributed

More information

Release Bulletin EDI Products 5.2

Release Bulletin EDI Products 5.2 Release Bulletin EDI Products 5.2 Document ID: DC00191-01-0520-01 Last revised: December, 2009 Copyright 1992-2009 by Sybase, Inc. All rights reserved. Sybase trademarks can be viewed at the Sybase trademarks

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

QTP Computing Laboratory Strategy

QTP Computing Laboratory Strategy Introduction QTP Computing Laboratory Strategy Erik Deumens Quantum Theory Project 12 September 2001 From the beginning of its computer operations (1980-1982) QTP has worked from a strategy and an architecture

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.

BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd. BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Installation & Configuration Guide

Installation & Configuration Guide EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Total Security Solution System: @SECUREVISION Essential Security for Net Businesses

Total Security Solution System: @SECUREVISION Essential Security for Net Businesses UDC 621.395.74:681.32.004.4 Total Security Solution System: @SECUREVISION Essential Security for Net Businesses VTakashi Ohgo (Manuscript received September 24, 2000) The numerous cases of cracking into

More information

Installation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with

Installation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with Installation Guide for use with Squid Web Proxy Cache Websense Enterprise Websense Web Security Suite v6.3.2 1996-2008, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.

More information

Replacing Sneaker Net with the Internet. DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT

Replacing Sneaker Net with the Internet. DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT Replacing Sneaker Net with the Internet DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT Problem Statement Paper Routing of Proposals Slow Opaque Financial Reporting Information

More information

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CERTIFIED SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CONTENT CC IN A NUTSHELL CC BACKGROUND AIM AND GOAL OF CC ADVANTAGES OF CC WHY DO WE RECOMMEND CC TO DEVELOPERS? WHEN IS CC THE RIGHT CHOICE?

More information

This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd.

This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. 1 Job Management Partner 1 Version 9 Availability Management

More information

Contents. BMC Remedy AR System 7.5.00 Compatibility Matrix

Contents. BMC Remedy AR System 7.5.00 Compatibility Matrix Contents AR SYSTEM SERVER SUPPORTED HARDWARE PLATFORMS AND OPERATING SYSTEMS... 3 AR SYSTEM SERVER SUPPORTED DATABASES...3 JAVA SUPPORT... 4 AR SYSTEM MID-TIER SUPPORTED CONFIGURATIONS...5 AR SYSTEM CLIENT

More information

PlexView Advanced Reporting System and Advanced Reporting System with Advanced Traffic Collection Software Release Notice 255-400-203R9.6.3.

PlexView Advanced Reporting System and Advanced Reporting System with Advanced Traffic Collection Software Release Notice 255-400-203R9.6.3. PlexView Advanced Reporting System and Advanced Reporting System with Advanced Traffic Collection Software Release Notice 255-400-203R9.6.3.1 Release 9.6.3.1 January 11, 2005 Lucent Technologies - Proprietary

More information

Open Smart Card Infrastructure for Europe

Open Smart Card Infrastructure for Europe Open Smart Card Infrastructure for Europe v2 Volume 8: Part 3-1: Authors: Security and Protection Profiles (Common Criteria Supporting Document) eesc TB3 Protection Profiles, Security Certification NOTICE

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information