I am pleased to report that the National Institute of Standards and Technology (NIST) has issued a Federal Information Processing Standard (FIPS) 140-2 Certification of the following Juniper Networks devices with Junos 14.1R4 software.
The FIPS certification is #2451.
This is a first time FIPS certification for the EX9200 and the PTX devices and a recertification for the M, MX, and T-series devices. This is Juniper Network’s 56th FIPS certification and this is the most comprehensive single FIPS certification completed to date.
FIPS Certification continues to be challenging as NIST requirements evolve including the deprecation of cryptographic algorithms that were once approved and increased focus on important cryptography elements like maintaining sufficient entropy and using strong deterministic random bit generators (DRBG).
NIST says that random number generators in many current FIPS certifications will be disallowed at the end of 2015. So what is the impact on Juniper Networks products?Read more...
Let’s face it; reality today is the majority of us have a mobile device – typically a smartphone, or even a tablet.
Plus, we all use our mobile devices to access and store “data”. The problem is what typically is this “data”?
Most of us think of “data” as something really important and critical, like a bank account, debit card or credit card numbers and other information of this nature. Also, often times when we hear “data”, we think of work-related stuff, such as sensitive e-mails and attachments, secret plans or programs, or maybe even ultra-sensitive information like intellectual property that could mean disaster if it fell into the “wrong hands,” such as a competitor.
Yes, all of that information, which can be accessed, downloaded, transmitted and stored on our mobile devices, is data but so are online banking and social networking account user names and passwords, or our corporate or e-mail access user names and passwords for which we leverage the auto-complete function on our mobile devices. Some of us even access, download and store sensitive medical or prescription records on our smartphones or tablets. Even pictures of our families can be sensitive data, not to mention private emails to or from our personal email accounts.Read more...
Discussing a wide range of topics impacting enterprises and
data center security.