Certificate 2256 - ProxySG S400-20 [1], S400-30 [2] and S400-40 [3]
intCertNum 2256
strVendorName Blue Coat Systems, Inc.
strURL http://www.bluecoat.com
strAddress1 420 N. Mary Avenue
strAddress2
strAddress3
strCity Sunnyvale
strStateProv CA
strPostalCode 94085
strCountry 94085
strContact Diana Robinson
strEmail diana.robinson@bluecoat.com
strPhone 845 454-6397
strFax
strContact2 Tammy Green
strEmail2 tammy.green@bluecoat.com
strFax2
strPhone2 801-999-2973
intCertNum 2256
strModuleName ProxySG S400-20 [1], S400-30 [2] and S400-40 [3]
strPartNumber Hardware Versions: 080-03568 [1], 080-03570 [1], 090-03075 [1], 080-03571 [1], 090-03076 [1], 080-03572 [2], 080-03574 [2], 090-03079 [2], 080-03575 [2], 090-03080 [2], 080-03576 [3], 080-03578 [3], 090-03083 [3], 080-03579 [3], 090-03084 [3] with FIPS Security Kit (Part Number: 085-02891);
Firmware Version: 6.5.2.9 build 144008
memModuleNotes When operated in FIPS mode with the tamper evident seals and the opacity baffle installed as indicated in the Security Policy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL http://www.bluecoat.com/products/proxysg
strModuleType Hardware
strValidationDate 09/22/2014
intOverallLevel 2
memIndividualLevelNotes -Mitigation of Other Attacks: N/A
strFIPSAlgorithms AES (Cert. #2931);
Triple-DES (Cert. #1744);
DRBG (Cert. #541);
HMAC (Certs. #1700 and #1857);
SHS (Certs. #2291 and #2467);
RSA (Cert. #1536);
CVL (Certs. #181 and #332)
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides between 112 and 150 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength);
MD5;
PRNG;
NDRNG
strConfiguration Multi-chip standalone
memModuleDescription Blue Coat ProxySG physical and virtual appliances are the core of the Blue Coat's Unified Security and Optimization solutions for business assurance. The appliances offer complete security and control of web traffic, providing rich policy constructs for threat protection, SSL traffic, authentication, filtering, data loss prevention and logging capabilities. The appliances also optimize web and internal application traffic through caching, bandwidth management, stream splitting, and protocol optimization for data, video, cloud and web applications.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 09/22/14 00:00:00
strLabName CGI
strValidationYear 2014