About us | Advertising | SecurityWatch
Home ? Articles ? Blog ? Reviews ? Press Releases ? Security Tools ? Sponsored Solutions
Press Releases
CipherOptics Encryption Appliance Receives FIPS Validation
Thursday, 1 July 2004 19:54 EST

RALEIGH -- CipherOptics Inc. today announced that its encryption technology has earned the Federal Information Processing Standard (FIPS) 140-2 level 2 certification (cert # 373). The CipherOptics' SG1001 encryption appliance now meets the government's requirement for FIPS- validated products for securing network data and applications.
The FIPS 140-2 Level 2 certification is awarded to products after thorough testing by an accredited independent laboratory. It is a benchmark used by government agencies as well as corporations implementing secure applications to determine which products offer robust, standardized protection.

"As a trusted IT leader and premier provider of IT solutions for government clients, Northrop Grumman Information Technology understands FIPS 140-2 certification is a prerequisite to deliver encryption solutions to government agencies," said Timothy Winters, Senior Alliance Manager Security Products & Services with Northrop Grumman.

The CipherOptics SG1001 is a high-performance network security appliance that provides encryption for the secure transmission of IP data, using IP security (IPSec), over non-secure wired or wireless networks. The SG1001 is the only IPSec encryption appliance available that offers full-duplex Gigabit Ethernet wire-speed throughput without slowing down network data transfer.

"The FIPS 140 Level 2 certification gives our customers confidence that CipherOptics' technology will protect all sensitive data with the highest level of performance," said Ronald Willis, CipherOptics President and Chief Executive Officer. "Validation of the CipherOptics Security Gateway against FIPS 140 requirements under the Cryptographic Module Validation Program, also allows our System Integration partners to design the product into their solutions for this market."

CipherOptics' SG1001 encryption appliance underwent a series of rigorous tests conducted by DOMUS IT Security laboratory, a National Institute of Standards and Technology (NIST) accredited testing laboratory. The FIPS 140 validation established by NIST uses accredited laboratories to perform tests of cryptographic modules. The tests include reviews of design, documentation, interfaces, services, algorithms, key management and physical packaging of the device. The CipherOptics SG1001 met or exceeded all of these criteria.

About CipherOptics

CipherOptics designs, manufactures and sells market-leading encryption appliances to secure information traveling over high-speed communication networks, storage area networks and communications service provider (CSP) network cores.

The CipherOptics family of encryption appliances is the only field-proven, government-certified solution available that encrypts data at full Gigabit line-rates with minimal latency for transmission over non-secure wired or wireless networks. In mission-critical applications at financial institutions, federal government/Homeland Security, and global enterprises, we enable organizations to completely secure all data communications while maximizing broadband network capacities at a very affordable cost -- all with minimal complexity and ease of installation.

Privately-held CipherOptics is based in Raleigh, North Carolina. In 2003, the company closed $12.4 million in Series B funding from Kodiak Venture Partners, Origin Partners L.P., Axiom Venture Partners L.P. and New Tampa Technologies L.L.C. For more information about CipherOptics please go to the company website at http://www.cipheroptics.com/ .

About DOMUS IT

DOMUS IT Security Laboratory is a unit of IBM Canada LTD and has over a decade of experience testing and evaluating products for cryptographic and security functionality.

For more information about DOMUS IT Security Laboratory please go to http://www.domusitsl.com/.



Featured Articles

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.

VoIP Telephony: Benefits for Businesses
Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.

Review: SmartLine DeviceLock
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year
Symantec Readies Urgent Patch

Copyright ? IT-Observer.com 2000 - 2005 ?? Privacy Policy | RSS Feeds
Site Meter