Red Hat Enterprise Linux 6.2 Openswan Cryptographic Module The services offered by Kaseya Virtual System Administrator are ever-broadening as IT management services needs increase, so do the tools and services provided by the framework." "The Kaseya Virtual System Administrator provides an IT automation framework allowing IT managers to proactively monitor, manage, maintain, and protect distributed IT resources using a single, integrated web-based interface. #1989, key wrapping) AES-CBC (non-compliant) Red Hat Enterprise Linux 5.5(64-bit) (single-user mode)
KASEYA AGENT EL CAPITAN MAC OS X
Tested Configuration(s): Tested as meeting Level 1 with MAC OS X v10.6.8 Virtual System Administrator Cryptographic Module The Cygnus X3 HSM Cryptographic Module employs strong encryption, decryption, and digital signature techniques for the protection of customer funds in Pitney Bowes Postage Metering products." "The Pitney Bowes Cygnus X3 Postal Security Device (PSD) has been designed in compliance with FIPS 140-2 in order to support international digital indicia standards globally. #1979, key wrapping key establishment methodology provides 128 or 256 bits of encryption strength) Diffie-Hellman (key agreement key establishment methodology provides 112 bits of encryption strength non-compliant less than 112 bits of encryption strength) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy (Hardware Version: P/N 1R84000 Version A Firmware Versions: 01.00.06 and (Device Abstraction Layer)) Cert#Ĭygnus X3 Hardware Security Module (XHSM) Please contact the CMVP if any errors are discovered or comments with suggestions for improvement of the validation listings. NOTE3: All questions regarding the implementation and/or use of any module located on the CMVP module validation lists should first be directed to the appropriate vendor point-of-contact (listed for each entry). NOTE2: The operator of a cryptographic module is responsible for ensuring that the algorithms and key lengths are in compliance with the requirements of NIST SP 800-131A. The algorithms, protocols, and cryptographic functions listed as "Other" or "Allowed" have not been tested through the CMVP and are not FIPS-Approved. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. The descriptions do not imply endorsement by the U.S. NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. If the module is embedded in a product or application, ask the product or application vendor to provide a signed letter or statement affirming that the unmodified validated cryptographic module is integrated in the solution the module provides all the cryptographic services in the solution and provide reference to the modules validation certificate number from this listing. VPN, SmartCard, USB memory token, etc.) or the module is embedded in a larger product or application (e.g. When selecting a module from a vendor, verify that the module is either the product or application itself (e.g. In addition, other vendors, who are not found in this list, may incorporate a validated cryptographic module from this list embedded into their own products. There may be a larger number of security products or applications available which use an embedded validated cryptographic module, than the number of modules which are found in this list. If the cryptographic module is a component of a larger product or application, one should contact the product or application vendor in order to determine how the product utilizes the embedded validated cryptographic module. A module may either be an embedded component of a product or application, or a complete product in-and-of-itself. It is important to note that the items on this list are cryptographic modules.