Cryptographic module achieves federal security validation

1 August 2019 News & Events, Infrastructure

Infinidat has announced that its cryptographic module for the InfiniBox and InfiniGuard has been awarded Federal Information Processing Standards (FIPS) 140-2 validation. The designation validates Infinidat’s cryptographic technologies which certify Infinidat data storage and backup systems for use in a defined set of government and regulated industries’ IT projects.

FIPS 140-2 validation is a requirement for any product implementing a cryptographic module that processes sensitive information and is used within the federal government. The standard is a joint effort by the National Institute of Standards and Technology (NIST) in the United States and the Communications Security Establishment Canada (CSEC) under the Canadian government while gaining worldwide recognition as an important benchmark for third-party validation of cryptographic-enabled products of all kinds.

Says Hayden Sadler, country manager for Infinidat South Africa, “The standard provides for increasing qualitative levels of security intended to cover a wide range of potential applications and environments. From a local perspective, this means that South African companies can be rest assured that their information is secure according to U.S. FIPS -validated encryption at any layer of the IT stack. By meeting these stringent security standards, we can ensure the highest protection of our clients’ data, further bolstering our own local Personal Protection of Information (PoPI) legislation.”

To facilitate the certification process, Infinidat partnered with security certification solutions provider Corsec Security, Inc. For two decades Corsec has assisted companies through the IT security certification process for FIPS 140-2, Common Criteria and the Department of Defense’s APL.

“Completion of the FIPS 140-2 validation process is a testament to Infinidat’s commitment to the storage needs of the U.S. government,” said Jake Nelson, director of marketing at Corsec. “Infinidat’s adherence to security standards and U.S. government regulations should provide users with the peace of mind that they are being protected with a high degree of security, assurance, and dependability.”

Data breaches are increasing at all levels of the IT stack – from user-level email attacks to data corruption and ransomware attacks to the theft of data as it is transported across unencrypted networks. End-to-end encryption, whether in the hypervisor, database or application, provides the highest level of data protection. Many customers hoping to adopt end-to-end encryption are limited due to their dependency on data reduction in their All-Flash Arrays. InfiniBox architecture allows these customers to securely consolidate their data while supporting end-to-end encryption.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Fire Ops SA Partners with Matrix
News & Events Fire & Safety Residential Estate (Industry)
Fire Ops SA, a South African private fire and rescue service, has announced its partnership with Matrix Vehicle Tracking to launch FireStop, providing Matrix and Beame clients with direct access to a dedicated professional private fire service.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Blue Security ranked best reaction team in KZN
News & Events Commercial (Industry)
Blue Security has been ranked the Best Reaction Team in KwaZulu-Natal following its outstanding performance at the SAIDSA Reaction Man Competition 2025, which took place on 25 September at the Ballito Defensive Sport Shooting Club.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Why Securex matters more than ever
Securex South Africa News & Events Fire & Safety Facilities & Building Management
Visitors will observe the application of integrated security solutions, including AI-enhanced surveillance, cloud-based access control, cybersecurity tools, and perimeter protection within residential, commercial, logistics, and industrial environments

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Keenfinity launches Radionix as new intrusion brand
Perimeter Security, Alarms & Intruder Detection News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.