CDSA Program Update SECURITY. Graham Bird. opengroup.org (650)

Size: px
Start display at page:

Download "CDSA Program Update SECURITY. Graham Bird. opengroup.org (650)"

Transcription

1 CDSA Program Update SECURITY Graham Bird opengroup.org (650)

2 Agenda Product Standards The Open Brand program Diffusion Schedules Q&A

3 Product Standards

4 Product Standards Real World Vendors product Buyers needs What it means to conform Concise Lots of pointers Web based

5 Product Standards UNIX 98 Server UNIX 98 Internet Server Specification Specification Specification Specification

6 CDSA Product Standards CDSA Client Smartcard Plugin Crypto Plugin

7 CDSA Client CSSM APIs digital signature public key delivery & validation certificate management crypto services optionally, key recovery CSSM SPIs Crypto Data Storage Certificate Library Trust Policy

8 Crypto Plugin Crypto SPI bulk encryption digital signature cryptographic hash key generation random number generation

9 Smartcard Plugin Crypto SPI bulk encryption digital signature cryptographic hash key generation random number generation Data Storage SPI persistent storage & recovery of: certificates revocation lists associated data

10 The Open Brand

11 What the Brand Stands For It Works It Will Continue to Work Problems Will Be Fixed Value. Backed by Guarantee. Ipso facto ad volorem

12 How Do You Know? SECURITY

13 How it Works Trademark Law Process to Certify APIs - Portability Data Formats Protocols Interoperability Assurance Hardware Independent

14 The Open Brand Family UNIX BASE CDE SECURITY

15 The Key Accelerator Over 1700 Branded Products To Date Procurements $25 Billion $25 Billion requiring the Open Brand

16 Brand Procurements Air Force Workstation $800 Million Desktop V $1.2 Billion Air Force ICARDS $932 Million NASA SEWPII $1800M

17 Market Impact - Example Single UNIX Specification Supported by all major vendors IBM MVS Siemens mainframe o/s API adoption in proprietary o/s Adoption in freeware

18 The Process Product? Practical Guide to The Open Brand Product Standard How to Test Formal Test Interpretations Waivers TSDs TMLA Registration Application Certificate Product Registered Annual Renewal

19 Test Suite(s) Indicators of Compliance Continuous not snapshot Supports Brand Quality Assured Lab Quality Control Lab

20 Administration Check Submission is Complete Audit Test Report Audit Conformance Statement Fees are correct Enter onto Register Certificate Issued Annual Renewal

21 Brand Development & Marketing

22 Brand Program Development Product Standard Conformance Statement Admin forms Test suite Trademarks Life-cycle specs Product Standard(s)

23 What can carry the Open Brand? We Use CDSA Applications TM CDSA Product Standard(s) TM Modules

24 Customers Applications Endorsement Any application CDSA Platform suppliers Infrastructure suppliers Module RSA etc

25 Ensuring Diffusion Brand development Trademarks Procurement Application & ISV endorsement Marketing & promotion

26 Promotion Press and Analyst Brief PR program Press releases Press tracking Collateral White papers Article placement Slide sets Speaker placement Vendor salesforce salesforce brief Collateral pack Help line ISV adoption program Plugathons

27 User Demand Procurement Targeted Visible / references Application Endorsement program It works with CDSA Simple & lightweight Web based

28 Timescales Product Standards Q2 Test Suite Q3/4 Procurement Product Q3 Q4/5?

29 Questions / Input?

30 Branding Environment Hardware & Software Dependencies Binary Compatible Families Architecture Specific PC

31 Interpreting Specifications Permanent Interpretations Until next Issue of Specification Temporary Interpretations Whilst a problem is investigated Waivers Cleared within 12 Months Agreed Test Suite Deficiencies Until test suite is fixed

32 Conformance Statement Records Implementation Details Numeric Limits Options Branding Environment One CS per Product Standard Available to Customers Web based

CDSA Technology. Intel Corporation Denise Ecklund July 1998

CDSA Technology. Intel Corporation Denise Ecklund July 1998 CDSA Technology Intel Corporation Denise Ecklund July 1998 Agenda Problem of Protecting Applications The CDSA Solution What is CDSA? Intel s Technology Role CDSA Today CDSA Tomorrow 2 Protecting an Application

More information

Common Operating Environment (COE) Platform Certification Program. Certification Policy

Common Operating Environment (COE) Platform Certification Program. Certification Policy Common Operating Environment (COE) Platform Certification Program Certification Policy February 2004 Version 2.0 Copyright February 2004, The Open Group All rights reserved. No part of this publication

More information

CIM Certification Program. Deborah May The Open Group

CIM Certification Program. Deborah May The Open Group CIM Certification Program Deborah May The Open Group d.may@opengroup.org Agenda Certification Program Overview of program Test Suite Overview of Test Suite Beta Release DMTF 2002 Developers' Conference

More information

POSIX : Certified by IEEE and The Open Group. Certification Policy

POSIX : Certified by IEEE and The Open Group. Certification Policy POSIX : Certified by IEEE and The Open Group Certification Policy Prepared by The Open Group October 21 2003 Revision 1.1 Table of Contents 1. Overview...4 1.1 Introduction...4 1.2 Terminology and Definitions...5

More information

Security Training Seminars An integral part of The Open Group Security Programme

Security Training Seminars An integral part of The Open Group Security Programme Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce Agenda Check! M Brief Overview of Security Program Key Projects Introduction

More information

Architecture Tool Certification Certification Policy

Architecture Tool Certification Certification Policy Architecture Tool Certification Certification Policy Version 1.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA 1 "How-to" with CDSA An Application Developers Guide Proposal and Feedback Session Phil Holmes How to with CSDA - Agenda 2 Overall Objectives The conventional approach Collaboration - How to Book & CD-ROM

More information

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM chanders@us.ibm.com IBM KeyWorks Market Needs History KeyWorks KeyWorks KeyWorks KeyWorks KeyWorks Suite

More information

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement certicom application notes Certicom Security for Government Suppliers developing products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage of the lucrative

More information

UNIX is a registered trademark of The Open Group

UNIX is a registered trademark of The Open Group UNIX is a registered trademark of 1/11/05 1 UNIX 03 A Status Update From http://www.unix.org UNIX is a registered Trademark of 1/11/05 2 Agenda The Single UNIX Specification New features of UNIX 03 UNIX

More information

OpenVMS Security Update 1M01

OpenVMS Security Update 1M01 OpenVMS Update M0 Helmut Ammer TCSC München Agenda Ratings ITSEC E C & E B update on V6. TCSEC C Ramp -> > Common Criteria COE DII Current Projects: Enterprise Features & Projects History Per- Profiles

More information

NFC Forum Certification Policy. Rules and Procedures for the Certification Program NFC Forum TM Version

NFC Forum Certification Policy. Rules and Procedures for the Certification Program NFC Forum TM Version NFC Forum Certification Policy Rules and Procedures for the Certification Program NFC Forum TM Version 1.5 2016-06-16 RESTRICTIONS ON USE This document is copyright 2010-2016 by the NFC Forum, and is made

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Trusted Computing Today: Benefits and Solutions

Trusted Computing Today: Benefits and Solutions Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution

More information

Compliance & Certification Phase 2 Path to Certification

Compliance & Certification Phase 2 Path to Certification Compliance & Certification Phase 2 Path to Certification Jose A. Rodrigo, AT4 wireless 11 November 2014 20 November 2014 AllSeen Alliance 1 Agenda 1. C&C Process Overview 2. Prepare / Apply / Test / Certify

More information

Introduction to GlobalPlatform Compliance Secretariat

Introduction to GlobalPlatform Compliance Secretariat Introduction to GlobalPlatform Compliance Secretariat Introduction Key to market stability is the adoption of proven standards. Industry acceptance of any standard or specification, however, will only

More information

ArchiMate Certification for People Training Course Accreditation Requirements

ArchiMate Certification for People Training Course Accreditation Requirements ArchiMate Certification for People Training Course Accreditation Requirements Version 2.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced,

More information

The Open Group Professional Certification Program. Accreditation Requirements

The Open Group Professional Certification Program. Accreditation Requirements The Open Group Professional Certification Program Accreditation Requirements Version 1.0 October 2018 Copyright 2018, The Open Group All rights reserved. This publication may be reproduced, stored in a

More information

MEMBERSHIP. Learn how you can get involved with SNIA

MEMBERSHIP. Learn how you can get involved with SNIA MEMBERSHIP Learn how you can get involved with SNIA SNIA, the Storage Networking Industry Association, is a non-profit global organization dedicated to developing standards and education programs to advance

More information

Sharing Secrets using Encryption Facility - Handson

Sharing Secrets using Encryption Facility - Handson Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Handbook December 2018

Handbook December 2018 Handbook December 2018 Table of Contents About this Handbook... 3 The EEP Program... 3 Objectives... 3 Benefits... 3 Education Provider Requirements... 4 Fees... 4 Features... 5 Benefits... 6 Application

More information

Hardware Cryptography and z/tpf

Hardware Cryptography and z/tpf z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

The Open Group Certification for People. Training Course Accreditation Requirements

The Open Group Certification for People. Training Course Accreditation Requirements The Open Group Certification for People Training Course Accreditation Requirements Version 1.1 February 2014 Copyright 2013-2014, The Open Group All rights reserved. No part of this publication may be

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb

ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb CITY OF CHICAGO Department of Procurement Services Jamie L. Rhee, Chief Procurement Officer 121 North LaSalle Street, Room 403 Chicago, Illinois 60602-1284 ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS)

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

Microsoft Refurbisher Programs. Program Overview for MAR & RRP

Microsoft Refurbisher Programs. Program Overview for MAR & RRP Microsoft Refurbisher Programs Program Overview for MAR & RRP Programs Overview Microsoft Refurbisher Programs offer refurbishers reduced royalty software licenses for genuine Microsoft software, tools

More information

Guide to ITK Compliant Output Based Specification

Guide to ITK Compliant Output Based Specification Guide to ITK Compliant Output Based Specification Directorate DHID Document Record ID Key Division DS&P/ITK NPFIT-ELIBR-AREL-DST-0420.03 Chief Technology Officer Paul Jones Status Approved Owner Keith

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Storage Networking Industry Association Michael Oros Executive Director. Learn more:

Storage Networking Industry Association Michael Oros Executive Director. Learn more: Storage Networking Industry Association Michael Oros Executive Director Learn more: www.snia.org @SNIA SNIA Vision and Mission Vision Statement Be the globally recognized and trusted authority for storage

More information

OSCon Open Source

OSCon Open Source : Open Source Security Development John Hurley, Ph.D. Security Policy Architect Apple Computer Overview OS X Security Architecture Common Data Security Architecture Open source security advantages Open

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

Feature List. This table sets out Mailock user account types & associated features: User Type Sponsored Freemium Premium Advanced. Automated Delivery

Feature List. This table sets out Mailock user account types & associated features: User Type Sponsored Freemium Premium Advanced. Automated Delivery This table sets out Mailock user account types & associated features: Feature List User Type Secure email Individual Read Reply / Compose to Sponsor Send to anyone Permanent Decrypt Option Secure Community

More information

User Authentication Services (UAS) Platform Security Division Intel Corporation April 1998

User Authentication Services (UAS) Platform Security Division Intel Corporation April 1998 Authentication Services () Platform Security Division Intel Corporation April 1998 Identification and Authentication Proof of Identity.. different factors what you know (Password) what you have (SmartCard)

More information

Certification/Re-Certification 2015

Certification/Re-Certification 2015 Certification/Re-Certification 2015 The Illinois State Crime Stoppers Association is dedicated to upholding the high standards of all the local programs in Illinois. To that end, we have adopted a process

More information

The Open Group Certification for People. Certification Policy. for Examination-Based Programs

The Open Group Certification for People. Certification Policy. for Examination-Based Programs The Open Group Certification for People Certification Policy for Examination-Based Programs Version 1.0 April 2016 Copyright 2009-2016, The Open Group All rights reserved. This publication may be reproduced,

More information

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1 PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright

More information

A Tale of Two Open Source Cryptography Projects. Bouncy Castle EJBCA

A Tale of Two Open Source Cryptography Projects. Bouncy Castle  EJBCA A Tale of Two Open Source Cryptography Projects Bouncy Castle http://www.bouncycastle.org and EJBCA http://www.ejbca.org BouncyCastle Set of cryptographic libraries used by developers in Java and C#. Deals

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

WebSphere 4.0 General Introduction

WebSphere 4.0 General Introduction IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata John Webster Principal IT Advisor, Illuminata SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations

More information

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19, Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code

More information

The Information Company for Storage Professionals

The Information Company for Storage Professionals CLOUD COMPUTING Slide 2 Provider s Idea of Cloud Storage App Code I.T. Slide 3 Consumer s Idea of Cloud Storage Automated IT Flexible Business Low Cost of Operations Reduced Risk Data is always available

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

DMR Interoperability Process DMR Association

DMR Interoperability Process DMR Association DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

IBM Optim Integrated Data Management

IBM Optim Integrated Data Management IBM Optim Integrated Data Management Szymon Kwapiszewski Jacek Lempart Agenda Information Management Brand at Krakow Software Lab Data life cycle DBA s life Storage example 2 Information Management brand

More information

Data Protection Everywhere. For the modern data center

Data Protection Everywhere. For the modern data center Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

eportfolio Requirements Request

eportfolio Requirements Request eportfolio Requirements Request Background An IMS Global Learning Consortium Special Interest Group (SIG) is addressing eportfolio interoperability. The SIG is seeking input from the e-learning community

More information

Streamline Certificate Request Processes. Certificate Enrollment

Streamline Certificate Request Processes. Certificate Enrollment Streamline Certificate Request Processes Certificate Enrollment Contents At the end of this section, you will be able to: Configure TPP to allow users to request new certificates through Aperture Policy

More information

Digital Certificate Operation in a Complex Environment PKI ARCHITECTURE QUESTIONNAIRE

Digital Certificate Operation in a Complex Environment PKI ARCHITECTURE QUESTIONNAIRE Digital Certificate Operation in a Complex Environment A project within the Joint Information Systems Committee s Authentication, Authorisation and Accounting middleware programme PKI ARCHITECTURE QUESTIONNAIRE

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

2009 Botz & Associates, Inc. All Rights Reserved. www.validtech.com www.botzandassociates.com E-mail: botz@botzandassociates.com E-mail: pcbotz@validtech.com Building a Strong Password Management System

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

microsoft deploying vista and pdf Reliable Source - Microsoft TS:Deploying And Material - Microsoft Valid TS:Deploying And

microsoft deploying vista and pdf Reliable Source - Microsoft TS:Deploying And Material - Microsoft Valid TS:Deploying And DOWNLOAD OR READ : MICROSOFT DEPLOYING VISTA AND OFFICE 2007 DESKTOPS SIMULATED TEST BANK 70 624 MARQUEE SERIES MICROSOFT OFFICE 2007 BRIEF WINDOWS XP TEXTBOOK ONLYUSING MICROSOFT OFFICE 2007 TUTORIALS

More information

Storage validation at GoDaddy Best practices from the world s #1 web hosting provider

Storage validation at GoDaddy Best practices from the world s #1 web hosting provider Storage validation at GoDaddy Best practices from the world s #1 web hosting provider Julia Palmer Storage and Backup Manager Justin Richardson Senior Storage Engineer Agenda and Benefits Agenda Faster,

More information

SRM: Can You Get What You Want? John Webster, Evaluator Group.

SRM: Can You Get What You Want? John Webster, Evaluator Group. SRM: Can You Get What You Want? John Webster, Evaluator Group. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³

LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ EXHIBIT B-2 LICENSEE: Address: Attention: Phone: Fax: Email: Account #: CERTIPORT LOGO LICENSE AGREEMENT Authorized Testing Centers This Logo License Agreement

More information

Notes: Describe the architecture of your product. Please provide also which Database technology is used for case management and evidence management.

Notes: Describe the architecture of your product. Please provide also which Database technology is used for case management and evidence management. EF-1. All protocols used between the different components in the distributed architecture (management server, agents, database, forensic analyst system, etc) shall be encrypted and signed. EF-2. The Enterprise

More information

China Code of Ethics Certification 2018 CHECKLIST

China Code of Ethics Certification 2018 CHECKLIST China Code of Ethics Certification 2018 CHECKLIST Medical technology companies in China (both AdvaMed members and non-members) may participate in this certification program. T he certification affirms

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

EU Code of Conduct on Data Centre Energy Efficiency

EU Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

Beyond the CC certificate. How to continue to assess the security assurance in operational systems?

Beyond the CC certificate. How to continue to assess the security assurance in operational systems? Beyond the CC certificate How to continue to assess the security assurance in operational systems? 1 Christophe BLAD / OPPIDA 1999 2005: Certifier then Technical manager of the French scheme 2005 now:

More information

TERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004

TERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004 TERRA Authored by: Garfinkel,, Pfaff, Chow, Rosenblum,, and Boneh A virtual machine-based platform for trusted computing Presented by: David Rager November 10, 2004 Why there exists a need Commodity OS

More information

Intel s Common Data Security Architecture

Intel s Common Data Security Architecture Intel s Common Data Security Architecture Draft Release 2.0 version 1.0 Presented at TOG Members Meeting PKI-TG Session June 26, 1997 Denise Ecklund, Intel Architecture Labs Today s Agenda History of CDSA

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

GSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world

GSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world GSMA Embedded SIM 9 th December 2013 Purpose of this Reference Messaging Pack Appropriate slides may be selected to used for within different presentations for multiple audiences To provide consistent

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

Key Management in a System z Enterprise

Key Management in a System z Enterprise IBM Systems IBM z Systems Security Conference Business Security for today and tomorrow > 27-30 September Montpellier Key Management in a System z Enterprise Leo Moesgaard (lemo@dk.ibm.com) Manager of IBM

More information

SHA-1 to SHA-2. Migration Guide

SHA-1 to SHA-2. Migration Guide SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware

More information

Polycom RealPresence Implementation Services Specialization Program Guide

Polycom RealPresence Implementation Services Specialization Program Guide Polycom RealPresence Implementation Services Specialization Program Guide CONTENTS Introduction 3 Overview 3 Definition 3 Covered products 3 Specialization requirements 3 Training and testing requirements

More information

Guide to IREE Certification

Guide to IREE Certification Guide to IREE Certification Certification Congratulations on your decision to pursue Investor Ready Energy Efficiency (IREE) Certification for your project! As a building owner, by choosing to pursue IREE

More information

Adding value to your MS customers

Adding value to your MS customers Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,

More information

The Open Group Certification for People. Training Course Accreditation Policy

The Open Group Certification for People. Training Course Accreditation Policy The Open Group Certification for People Training Course Accreditation Policy Version 1.1 February 2014 Copyright 2013-2014, The Open Group All rights reserved. No part of this publication may be reproduced,

More information

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date Welcome to the SafeNet Day! Prague 1st of October 2013 Insert Your Name Insert Your Title Insert Date Corporate Brief & Presence in Central Europe Anton Porok Director Central EMEA, SafeNet IT Landscape

More information

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50 Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and

More information

IBM SecureWay On-Demand Server Version 2.0

IBM SecureWay On-Demand Server Version 2.0 Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,

More information

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Software Announcement February 1, 2000 IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Overview Payment Gateway for AIX,

More information

The Power of Partnership

The Power of Partnership VPN BROCHURE VPN BROCHURE / 1 Market Leading Virtualization and Cloud Computing Solutions, Award-Winning Programs, Unparalleled Value The industry is changing, the market is moving and customers are continuously

More information

UPnP Certification Overview

UPnP Certification Overview UPnP Certification Overview December 2014 Wouter van der Beek Clarke Stevens www.upnp.org Wouter van der Beek Clarke Stevens 2014 UPnP Forum Contents Logo Reasoning why Logo usage Certification Process

More information

European Code of Conduct on Data Centre Energy Efficiency

European Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JOINT RESEARCH CENTRE Institute for Energy and Transport Renewable Energy Unit European Code of Conduct on Data Centre Energy Efficiency Introductory guide for applicants

More information

How I Learned to Stop Worrying and Love the Internet of Things

How I Learned to Stop Worrying and Love the Internet of Things SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity

More information

Utility Capacity on Demand: What Utility CoD Is and How to Use It

Utility Capacity on Demand: What Utility CoD Is and How to Use It Redpaper Utility Capacity on Demand: What Utility CoD Is and How to Use It Executive overview This IBM Redpaper document is about Utility Capacity on Demand (CoD). It provides a high-level overview to

More information

Build your own Cloud on Christof Westhues

Build your own Cloud on Christof Westhues Build your own Cloud on Christof Westhues chwe@de.ibm.com IBM Big Data & Elastic Storage Tour Software Defined Infrastructure Roadshow December 2 4, 2014 New applications and IT are being built for Cloud

More information