Certificate 2038 - CryptoComply | Server
intCertNum 2038
strVendorName SafeLogic Inc.
strURL http://www.safelogic.com
strAddress1 459 Hamilton Ave
strAddress2 Suite 306
strAddress3
strCity Palo Alto
strStateProv CA
strPostalCode 94301
strCountry 94301
strContact SafeLogic Inside Sales
strEmail sales@safelogic.com
strPhone
strFax
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2038
strModuleName CryptoComply | Server
strPartNumber Software Version: 2.1
memModuleNotes When operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL http://www.safelogic.com/cryptocomply/
strModuleType Software
strValidationDate 11/15/2013;01/23/2014;02/20/2014;01/25/2016;02/05/2016
intOverallLevel 1
memIndividualLevelNotes ;;-Operational Environment: Tested as meeting Level 1 with Windows Server 2008 R2 on a Dell OptiPlex 755; SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755; CentOS 6.3 on a Dell OptiPlex 755; Mac OS X 10.8 on a MacBook Air; Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755; CentOS 6.3 on a GigaVUE-TA1 (single-user mode)
strFIPSAlgorithms AES (Cert. #2273);
CVL (Cert. #44);
DRBG (Cert. #281);
DSA (Cert. #709);
ECDSA (Cert. #368);
HMAC (Cert. #1391);
RSA (Cert. #1166);
SHS (Cert. #1954);
Triple-DES (Cert. #1420)
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RNG
strConfiguration Multi-chip standalone
memModuleDescription CryptoComply | Server is a standards-based ""Drop-in Compliance"" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
intModuleCount 1
memAdditionalNotes 01/23/14: Changed POC and vendor product link.
02/20/14: Added OE CentOS 6.3 on a GigaVUE-TA1 and updated security policy.
Removed comma from the vendor name and updated the vendor's address.
RNG moved from approved to non-approved mode, removing services that depended on the RNG. Updated SP to reflect this.
strFirstValidtionDate 11/15/13 00:00:00
strLabName EWA
strValidationYear 2013