Cryptographic module achieves federal security validation

1 August 2019 News & Events, Infrastructure

Infinidat has announced that its cryptographic module for the InfiniBox and InfiniGuard has been awarded Federal Information Processing Standards (FIPS) 140-2 validation. The designation validates Infinidat’s cryptographic technologies which certify Infinidat data storage and backup systems for use in a defined set of government and regulated industries’ IT projects.

FIPS 140-2 validation is a requirement for any product implementing a cryptographic module that processes sensitive information and is used within the federal government. The standard is a joint effort by the National Institute of Standards and Technology (NIST) in the United States and the Communications Security Establishment Canada (CSEC) under the Canadian government while gaining worldwide recognition as an important benchmark for third-party validation of cryptographic-enabled products of all kinds.

Says Hayden Sadler, country manager for Infinidat South Africa, “The standard provides for increasing qualitative levels of security intended to cover a wide range of potential applications and environments. From a local perspective, this means that South African companies can be rest assured that their information is secure according to U.S. FIPS -validated encryption at any layer of the IT stack. By meeting these stringent security standards, we can ensure the highest protection of our clients’ data, further bolstering our own local Personal Protection of Information (PoPI) legislation.”

To facilitate the certification process, Infinidat partnered with security certification solutions provider Corsec Security, Inc. For two decades Corsec has assisted companies through the IT security certification process for FIPS 140-2, Common Criteria and the Department of Defense’s APL.

“Completion of the FIPS 140-2 validation process is a testament to Infinidat’s commitment to the storage needs of the U.S. government,” said Jake Nelson, director of marketing at Corsec. “Infinidat’s adherence to security standards and U.S. government regulations should provide users with the peace of mind that they are being protected with a high degree of security, assurance, and dependability.”

Data breaches are increasing at all levels of the IT stack – from user-level email attacks to data corruption and ransomware attacks to the theft of data as it is transported across unencrypted networks. End-to-end encryption, whether in the hypervisor, database or application, provides the highest level of data protection. Many customers hoping to adopt end-to-end encryption are limited due to their dependency on data reduction in their All-Flash Arrays. InfiniBox architecture allows these customers to securely consolidate their data while supporting end-to-end encryption.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.