Cryptographic module achieves federal security validation

1 August 2019 News & Events, Infrastructure

Infinidat has announced that its cryptographic module for the InfiniBox and InfiniGuard has been awarded Federal Information Processing Standards (FIPS) 140-2 validation. The designation validates Infinidat’s cryptographic technologies which certify Infinidat data storage and backup systems for use in a defined set of government and regulated industries’ IT projects.

FIPS 140-2 validation is a requirement for any product implementing a cryptographic module that processes sensitive information and is used within the federal government. The standard is a joint effort by the National Institute of Standards and Technology (NIST) in the United States and the Communications Security Establishment Canada (CSEC) under the Canadian government while gaining worldwide recognition as an important benchmark for third-party validation of cryptographic-enabled products of all kinds.

Says Hayden Sadler, country manager for Infinidat South Africa, “The standard provides for increasing qualitative levels of security intended to cover a wide range of potential applications and environments. From a local perspective, this means that South African companies can be rest assured that their information is secure according to U.S. FIPS -validated encryption at any layer of the IT stack. By meeting these stringent security standards, we can ensure the highest protection of our clients’ data, further bolstering our own local Personal Protection of Information (PoPI) legislation.”

To facilitate the certification process, Infinidat partnered with security certification solutions provider Corsec Security, Inc. For two decades Corsec has assisted companies through the IT security certification process for FIPS 140-2, Common Criteria and the Department of Defense’s APL.

“Completion of the FIPS 140-2 validation process is a testament to Infinidat’s commitment to the storage needs of the U.S. government,” said Jake Nelson, director of marketing at Corsec. “Infinidat’s adherence to security standards and U.S. government regulations should provide users with the peace of mind that they are being protected with a high degree of security, assurance, and dependability.”

Data breaches are increasing at all levels of the IT stack – from user-level email attacks to data corruption and ransomware attacks to the theft of data as it is transported across unencrypted networks. End-to-end encryption, whether in the hypervisor, database or application, provides the highest level of data protection. Many customers hoping to adopt end-to-end encryption are limited due to their dependency on data reduction in their All-Flash Arrays. InfiniBox architecture allows these customers to securely consolidate their data while supporting end-to-end encryption.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Bosch Security renamed Keenfinity
News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
Wialon announces integration with fleet maintenance and optimisation platform
News & Events Transport (Industry) Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.