intCertNum |
2581 |
strVendorName |
FireEye, Inc. |
strURL |
|
strAddress1 |
1440 McCarthy Ave. |
strAddress2 |
|
strAddress3 |
|
strCity |
Milipitas |
strStateProv |
CA |
strPostalCode |
95035 |
strCountry |
95035 |
strContact |
Peter Kim |
strEmail |
certifications@fireeye.com |
strPhone |
408-321-6300 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2581 |
strModuleName |
FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 |
strPartNumber |
Hardware Versions: HX 4400, HX 4400D, HX 4402, HX 9402; Firmware Version: 3.1.0 |
memModuleNotes |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 3 of the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
03/14/2016 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: N/A |
strFIPSAlgorithms |
AES (Cert. #3447); CVL (Cert. #533); DRBG (Cert. #843); ECDSA (Cert. #696); HMAC (Cert. #2195); RSA (Certs. #1758 and #1759); SHS (Certs. #2836 and #2837); Triple-DES (Cert. #1941) |
strOtherAlgorithms |
Diffie-Hellman (CVL Cert. #533, key agreement: key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ECDH (key agreement: key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; DES; RC4; HMAC-MD5; NDRNG |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The FireEye HX series appliances enable security operations teams to correlate network and endpoint activity. Organizations can automatically investigate alerts generated by FireEye Threat Prevention Platforms, log management, and network security products, apply intelligence from FireEye to continuously validate Indicators of Compromises on the endpoints and identify if a compromise has occurred and assess the potential risk. |
intModuleCount |
4 |
memAdditionalNotes |
|
strFirstValidtionDate |
03/14/16 00:00:00 |
strLabName |
Acumen |
strValidationYear |
2016 |