Cryptographic module achieves federal security validation

1 August 2019 News & Events, Infrastructure

Infinidat has announced that its cryptographic module for the InfiniBox and InfiniGuard has been awarded Federal Information Processing Standards (FIPS) 140-2 validation. The designation validates Infinidat’s cryptographic technologies which certify Infinidat data storage and backup systems for use in a defined set of government and regulated industries’ IT projects.

FIPS 140-2 validation is a requirement for any product implementing a cryptographic module that processes sensitive information and is used within the federal government. The standard is a joint effort by the National Institute of Standards and Technology (NIST) in the United States and the Communications Security Establishment Canada (CSEC) under the Canadian government while gaining worldwide recognition as an important benchmark for third-party validation of cryptographic-enabled products of all kinds.

Says Hayden Sadler, country manager for Infinidat South Africa, “The standard provides for increasing qualitative levels of security intended to cover a wide range of potential applications and environments. From a local perspective, this means that South African companies can be rest assured that their information is secure according to U.S. FIPS -validated encryption at any layer of the IT stack. By meeting these stringent security standards, we can ensure the highest protection of our clients’ data, further bolstering our own local Personal Protection of Information (PoPI) legislation.”

To facilitate the certification process, Infinidat partnered with security certification solutions provider Corsec Security, Inc. For two decades Corsec has assisted companies through the IT security certification process for FIPS 140-2, Common Criteria and the Department of Defense’s APL.

“Completion of the FIPS 140-2 validation process is a testament to Infinidat’s commitment to the storage needs of the U.S. government,” said Jake Nelson, director of marketing at Corsec. “Infinidat’s adherence to security standards and U.S. government regulations should provide users with the peace of mind that they are being protected with a high degree of security, assurance, and dependability.”

Data breaches are increasing at all levels of the IT stack – from user-level email attacks to data corruption and ransomware attacks to the theft of data as it is transported across unencrypted networks. End-to-end encryption, whether in the hypervisor, database or application, provides the highest level of data protection. Many customers hoping to adopt end-to-end encryption are limited due to their dependency on data reduction in their All-Flash Arrays. InfiniBox architecture allows these customers to securely consolidate their data while supporting end-to-end encryption.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.