intCertNum |
2615 |
strVendorName |
Mojo Networks, Inc. |
strURL |
http://www.mojonetworks.com |
strAddress1 |
339 N. Bernardo Avenue |
strAddress2 |
Suite 200 |
strAddress3 |
|
strCity |
Mountain View |
strStateProv |
CA |
strPostalCode |
94043 |
strCountry |
94043 |
strContact |
Hemant Chaskar |
strEmail |
Hemant.Chaskar@mojonetworks.com |
strPhone |
650-961-1111 |
strFax |
650-961-1169 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2615 |
strModuleName |
AirTight Wireless Sensor |
strPartNumber |
Hardware Versions: C-75 and C-75-E with Tamper Evident Seal Kit: C-TPL-A; Firmware Version: 7.2.FIPS.04 |
memModuleNotes |
When operated in FIPS mode and with tamper evident seals installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
04/12/2016;04/14/2016;04/15/2016;04/19/2016 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Mitigation of Other Attacks: N/A;-Operational Environment: N/A |
strFIPSAlgorithms |
AES (Cert. #3766); CVL (Cert. #710); DRBG (Cert. #1036); HMAC (Cert. #2465); KBKDF (Cert. #77); KTS (AES Cert. #3766 and HMAC Cert. #2465; key establishment methodology provides 128 or 256 bits of encryption strength); RSA (Cert. #1937); SHS (Cert. #3135) |
strOtherAlgorithms |
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength); MD5; NDRNG |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The module performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks. |
intModuleCount |
2 |
memAdditionalNotes |
Updated module name. Updated vendor name. Changed Vendor email address (as to correct a previous submission that did not correctly update the Vendor Email). No security changes were made and no Security Policy was required. |
strFirstValidtionDate |
04/12/16 00:00:00 |
strLabName |
CygnaCom |
strValidationYear |
2016 |