intCertNum |
2256 |
strVendorName |
Blue Coat Systems, Inc. |
strURL |
http://www.bluecoat.com |
strAddress1 |
420 N. Mary Avenue |
strAddress2 |
|
strAddress3 |
|
strCity |
Sunnyvale |
strStateProv |
CA |
strPostalCode |
94085 |
strCountry |
94085 |
strContact |
Diana Robinson |
strEmail |
diana.robinson@bluecoat.com |
strPhone |
845 454-6397 |
strFax |
|
strContact2 |
Tammy Green |
strEmail2 |
tammy.green@bluecoat.com |
strFax2 |
|
strPhone2 |
801-999-2973 |
intCertNum |
2256 |
strModuleName |
ProxySG S400-20 [1], S400-30 [2] and S400-40 [3] |
strPartNumber |
Hardware Versions: 080-03568 [1], 080-03570 [1], 090-03075 [1], 080-03571 [1], 090-03076 [1], 080-03572 [2], 080-03574 [2], 090-03079 [2], 080-03575 [2], 090-03080 [2], 080-03576 [3], 080-03578 [3], 090-03083 [3], 080-03579 [3], 090-03084 [3] with FIPS Security Kit (Part Number: 085-02891); Firmware Version: 6.5.2.9 build 144008 |
memModuleNotes |
When operated in FIPS mode with the tamper evident seals and the opacity baffle installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
http://www.bluecoat.com/products/proxysg |
strModuleType |
Hardware |
strValidationDate |
09/22/2014 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Mitigation of Other Attacks: N/A |
strFIPSAlgorithms |
AES (Cert. #2931); Triple-DES (Cert. #1744); DRBG (Cert. #541); HMAC (Certs. #1700 and #1857); SHS (Certs. #2291 and #2467); RSA (Cert. #1536); CVL (Certs. #181 and #332) |
strOtherAlgorithms |
RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength); MD5; PRNG; NDRNG |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
Blue Coat ProxySG physical and virtual appliances are the core of the Blue Coat's Unified Security and Optimization solutions for business assurance. The appliances offer complete security and control of web traffic, providing rich policy constructs for threat protection, SSL traffic, authentication, filtering, data loss prevention and logging capabilities. The appliances also optimize web and internal application traffic through caching, bandwidth management, stream splitting, and protocol optimization for data, video, cloud and web applications. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
09/22/14 00:00:00 |
strLabName |
CGI |
strValidationYear |
2014 |
|