SlideShare a Scribd company logo
1 of 71
Download to read offline
DIRECTORY OF INFOSEC ASSURED
PRODUCTS 2001
CONTENTS

    INTRODUCTION                                                        Page 3-4

    IACS
    Introduction to CESG Infosec Assurance and Certification Services   Page 5-8
    CLEF Contact Details                                                Page 9
    International Certification Body Contact Details                    Page 9
    CC and ITSEC Certified Products
     • Smart Cards                                                      Page 10
     • PC Access Control                                                Page 11-13
     • Operating Systems                                                Page 14-18
     • Networking                                                       Page 19-24
     • Firewalls                                                        Page 24-31
     • Communications                                                   Page 32-37
     • Databases                                                        Page 38-43
     • Miscellaneous                                                    Page 43-44

    PROTECTION PROFILES
    Introduction to Protection Profiles                                 Page 45
    List of Protection Profiles products                                Page 46-49

    CAPS
    Introduction to CESG Approved Products Scheme                       Page 51-52
    CAPS products
     • Data Encryption                                                  Page 53-55
     • Communications Security                                          Page 55-57
     • Access Control                                                   Page 58-61
     • Miscellaneous                                                    Page 62

    TEMPEST
    Introduction to Tempest                                             Page 63
    List of Tempest approved products                                   Page 64-66
    Company names and addresses                                         Page 67-68

    INDEX                                                               Page 69-70




2
INTRODUCTION

                                        This ‘Directory of Infosec Assured
                                        Products’ is a new publication that
                                        replaces the former UKSP-06. It has
                                        been produced as a top-level guide for
                                        both product developers, vendors and
                                        end-users, and gives details of the
                                        means by which security products are
                                        approved or certified, an overview
                                        of the products’ features, and the
                                        context in which they should be used.
                                        The Directory will be updated on an
                                        annual basis. However, as new products
                                        are regularly being approved and
                                        certified, these will be reflected on
                                        CESG’s websites, accessible via
                                        www.cesg.gov.uk, as and when they
                                        become available.

                                        The first part of the Directory contains
                                        an introduction to CESG’s Infosec
                                        Assurance and Certification Services
                                        [IACS]. IACS has been created to provide
The Communications-Electronics          a seamless service to customers, and
Security Group [CESG] is the UK’s       products listed in the sections which
National Technical Authority for        follow cover the various aspects of IACS.
Information Security. As part of this   It is recognised that, in practice,
remit, CESG works closely with IT       customers will require more specific
developers and vendors to provide       guidance. The IACS management office
end users with a choice of products     has therefore been created to provide
whose security features have been       advice and guidance to developers,
objectively assessed and which          vendors and end-users on the most
meet clear standards of security        appropriate solution to their specific
assurance.                              assurance requirements.

                                        This is followed by a description of the
                                        mechanisms by which products are
                                        certified under ITSEC or Common
                                        Criteria, a list of certified products, and
                                        an explanation of ‘protection profiles’.
                                        Also contained in the Directory is a brief
                                        description of the new ‘Fast Track
                                        Assessment’ (FTA) service which has
                                        been designed to assess IT security
                                        products at the specific behest of
                                        customers in government.
                                                                                      3
The Directory next has a section covering
    the CESG Assisted Products Scheme
    [CAPS].

    This scheme ensures that government
    and public sector users have access to a
    wide range of approved products that
    employ cryptographic security measures.
    These products have undergone a
    thorough investigation of the security
    offered by the cryptography employed,
    whether this is through implementation
    of a CESG algorithm or a public domain
    algorithm.

    Finally, there is a section containing an
    introduction to TEMPEST services and a
    list of TEMPEST certified products.

    Inevitably, a directory such as this cannot
    cover all aspects of approved or certified
    Infosec products and related services.
    Customers may need more in-depth
    guidance and advice, and contact details
    are therefore provided in each of the
    relevant sections.

    For any general queries regarding CESG’s
    wider range of Infosec services, please
    contact the marketing office, details for
    which are given on the back page of this
    directory.




4
IACS
(IACS)            Infosec Assurance and Certification Services



                                       The IACS approach
                                       For Developers…
                                       Technical assessors from IACS will work
                                       with developers or end users to define
                                       the best solution to their assurance
                                       requirements. By understanding the
                                       developer’s goals, IACS can define the
                                       most effective assessment package to
                                       achieve them.

                                       An assessment package could include:
                                       s   Internationally recognised CC or
                                           ITSEC Certification
                                       s   Cryptographic approval for HMG
                                           and the CNI (usually carried out
                                           under CAPS)
                                       s   Fast Track assessment of products for
                                           HMG and the CNI
                                       s   Systems assessments at all levels for
IT products and systems evolve
                                           HMG and commerce
rapidly and are increasingly diverse
and complicated. Similarly, customer   For End Users…
requirements change and expand to
                                       Products which have been certified by
counter new threats and to adapt
                                       us, or by our partners around the world,
to new ways of working. CESG has
                                       offer end users ready-made assurance.
brought together its assurance
                                       Where a Government or CNI customer
services under IACS to offer
                                       has a requirement for assurance in an
bespoke solutions to these
                                       uncertified product, we can perform a
new security challenges.
                                       Fast Track Assessment. This allows the
                                       customer to determine whether the
                                       product is appropriate for his needs.
                                       If assurance is required in a system,
                                       then a range of packages, including IT
                                       Health Check, is available.
                                           www.cesg.gsi.gov.uk
                                           e-mail: iacs@cesg.gsi.gov.uk
                                           IACS Management Office
                                           PO Box 152 Cheltenham
                                           Gloucestershire GL52 5UF
                                           Tel. +44 (0)1242 238739
                                           Fax: +44 (0)1242 235233
                                                                                   5
Formal Evaluation and                         Certificate Maintenance Scheme
    Certification                                 Evaluation results only apply to a
    The products within this section have         specific version of a product, and any
    been certified against either Common          subsequent changes (including patches,
    Criteria or IT Security Evaluation Criteria   hot fixes and service packs) to that
    (ITSEC). Certificates are awarded             product may invalidate those results
    following extensive testing of the            and, therefore, the Certificate. Because
    product’s IT security features to ensure      the evolution of products is so rapid,
    that those features meet an agreed            the Certificate Maintenance Scheme
    Security Target. Results of a successful      (CMS) has been devised in response.
    evaluation are published in a                 CMS provides a means of maintaining
    Certification Report. This contains           the same level of assurance in a product
    additional information and advice on          after certification without the need for
    how the certified product should be           re-evaluation.
    used and any restrictions that may apply
    in its configuration or use on specific       ITSEC
    platforms. Prospective purchasers of          ITSEC is the set of criteria used for the
    certified products should read both the       past decade by Europe and Australasia
    ST and the CR to ensure that the              for the evaluation of products and
    product is suitable. STs and CRs are          systems. ITSEC was a major building
    available from the developers and, in         block in the formulation of the
    addition, can usually be downloaded           Common Criteria.
    from the CESG web site.
                                                  Common Criteria
    What is a Security Target?                    CC represents the outcome of
                                                  international efforts to align and
    This is a document specifying the
                                                  develop the existing European and
    security functionality of a product and
                                                  North American criteria and has been
    the assurance level against which it is
                                                  ratified as ISO standard 15408. The
    evaluated as well as a description
                                                  approximate assurance correspondence
    relating the product to the environment
                                                  between ITSEC and CC is shown below.
    in which it will operate.
                                                  A fuller description of the testing carried
                                                  out at each assurance level is contained
    Vulnerabilities                               on the web site.
    Certification is not a guarantee of
    freedom from security vulnerabilities;
                                                  Common Criteria        ITSEC
    there remains a possibility that
    exploitable vulnerabilities may be            EAL1                   –
    discovered after a Certificate has been       EAL2                   E1
    awarded. Users and prospective
                                                  EAL3                   E2
    purchasers should check regularly
    whether any security vulnerabilities have     EAL4                   E3
    been discovered since certification and,      EAL5                   E4
    if appropriate, should check with the
                                                  EAL6                   E5
    vendor to see if any patches exist for
    the product.                                  EAL7                   E6



6
International Mutual Recognition                    on products which have been assessed
Developers whose products are certified             elsewhere. Links are available from the
against ITSEC or CC enjoy the benefits of           CESG web site and contact details for
an internationally recognised Certificate.          the other recognised Certification Bodies
In this brochure we detail only those               appear on page 9.
products which have been evaluated in               HMG Departments wishing to use
the UK, but end users should access the             foreign certified products in
other relevant national web sites to                environments where national security is
obtain the most up to date information              an issue are advised to consult CESG.



Our Certificates are currently recognised as follows:

 Assurance Levels Recognised
                                                    Evaluation – CESG working
 Australia &         ITSEC E1-E6
                                                    with industry
 New Zealand          CC EAL1-4
                                                    Formal evaluation in the UK is carried
 Canada                                             out by independent testing laboratories
 Israel                CC EAL1-4                    known as CLEFs which are appointed by
 USA                                                the Certification Body in CESG. CLEFs
                                                    meet rigorous security and ISO/IEC
 France                                             17025 quality standards. The UK has 5
 Finland                                            CLEFs, which can be contracted to carry
                                                    out both evaluation and preparatory
 Germany
                                                    consultancy work. CLEF contact details
 Greece                                             are on page 9.
 Italy               ITSEC E1-E6
                      CC EAL 1-7                    The results of the testing of the product
 Netherlands
                                                    are provided to the Certification Body in
 Norway                                             an evaluation technical report which
 Spain                                              forms the basis of the Certification
 Sweden                                             Report. The CB is part of CESG and is
 Switzerland                                        itself accredited by UKAS to EN45011
                                                    for its ITSEC and CC certifications.


CESG recognises Certificates from other international bodies as follows:

 Certification/Validation           Recognised Assurance Levels

AISEP, Australia                    Common Criteria EAL1 to EAL4, ITSEC E1 to E6
BSI, Germany                        Common Criteria EAL1 to EAL7, ITSEC E1 to E6
CSE, Canada                         Common Criteria EAL1 to EAL4
DCSSI, France                       Common Criteria EAL1 to EAL7, ITSEC E1 to E6
NIAP, USA                           Common Criteria EAL1 to EAL4




                                                                                                7
Fast Track                                    Entering into evaluation
    Fast Track Assessment (FTA) provides a        within IACS
    fast, flexible, cost-effective process for    Developers need to contact both a CLEF
    the generation of a CESG endorsed             and the IACS Management Office in order
    assessment of the extent to which             to determine what sort of evaluation is
    security-enabled products meet the            to be carried out and how much the
    Infosec requirements of Sponsors, in          service will cost. It may be advisable to
    accordance with national Infosec policy.      obtain some technical consultancy
    Sponsors would be central and local           services prior to the commitment to
    government, and Critical National             evaluation, and guidance and advice is
    Infrastructure (CNI) services, where it is    available from the CLEFs, the IACS MO
    in the national interest. FTA tailors each    and CESG Listed Advisor Scheme
    assessment to the context of the              consultants. The need for evaluation
    intended use of the product, resulting in     consultancy should be discussed with the
    a report that provides authoritative          IACS MO and the CLEFs at the start of
    guidance on the product’s suitability.        the product evaluation lifecycle.

    The FTA service provides the assurance        Where cryptography is a key function of
    required by identified sponsors in products   the security functionality offered by the
    whose market and limited cryptography         product and the intended end users
    do not justify formal evaluation and          include HMG clients, then this must be
    certification, or evaluation under CAPS.      assessed by CESG. This can be done
    The FTA Service is intended to address        under the CESG Assisted Products
    assurance requirements in the low to          Scheme (CAPS) and as a single package
    medium range.                                 with ITSEC/CC or Fast Track evaluations
                                                  or assessments.
                                                  The IACS Management Office is happy to
    System Evaluations
                                                  provide more information on any of the
    System evaluation is highly relevant as a     Assurance and Certification Services
    means of minimising risk and as a             briefly described here.
    confidence hallmark for trading partners,
    especially as systems typically comprise a
    combination of certified and uncertified
    products. Important benefits of such
    evaluations are demonstrable compliance
    with the provisions of the Data Protection
    Act (1998), and supporting evidence that
    will enhance existing ISO17799
    accreditation and assist in demonstrating
    compliance with BS7799 Part 2. CESG
    offers a number of flexible options
    including evaluations where only limited
    functionality is tested and evaluation
    against an assurance profile (eg E3 for
    firewall, E2 for authentication, E1 for
    audit) to meet differing requirements. For
    Government or CNI users there is also the
    option of a system IT Health Check.



8
CLEF Contact Details             Foreign Scheme Contact Details
CMG Admiral (CLEF)               Australia
King’s Court                     www.dsd.gov.au/infosec
91-93 High Street                The AISEP Manager
Camberley                        Certification & Evaluation Group
Surrey GU15 3RN                  Information Security Branch
Tel. +44 (0) 1276 686678         Defence Signals Directorate
Fax. +44 (0) 1276 691028         Locked Bag 5076, Kingston ACT 2604
Ralph Worswick                   Tel. +61 2 6265 0342
ralph.worswick@cmgplc.com        Fax. +62 2 6265 0328
EDS Ltd (CLEF)
Wavendon Tower                   Canada
Wavendon                         www.cse.dnd.ca
Milton Keynes                    Communications Security Establishment
Bucks MK17 8LX                   Criteria Coordinator
Tel. +44 (0) 1908 284234         IT Security Standards and Initiatives
Fax. +44 (0) 1908 284393         PO Box 9703, Terminal
Trevor Hutton                    Ottawa, Canada K1G 3Z4
trevor.hutton@edl.uk.eds.com     Tel. +1 613 991 7600
                                 Fax. +1 613 991 7411
IBM Global Services (CLEF)
Meudon House
Meudon Avenue                    France
Farnborough                      www.scssi.gouv.fr
Hants GU14 7NB                   Direction Centrale de la Sécurité des
Tel. +44 (0) 1252 558081         Systèmes d’Information,
Fax. +44 (0) 1252 558001         18, Rue du Docteur Zamenhof
Bob Finlay                       F-92131, Issy-Les-Moulineaux
bob_finlay@uk.ibm.com            Cédex, France
                                 Tel. +33 141 463784
Logica UK Ltd (CLEF)             Fax. +33 141 463701
Chaucer House
The Office Park
Springfield Drive                Germany
Leatherhead                      www.bsi.bund.de
Surrey KT22 7LP                  Bundesamt für Sicherheit in der
Tel. +44 (0) 1372 369831         Informationstechnik
Fax. +44 (0) 1372 369834         Referat II 2, Godesberger Allee 183
Simon Milford                    53175 Bonn, Germany
MilfordS@logica.com              Tel. +49 228 9583 141
                                 Fax. +49 228 9582 455
Syntegra (CLEF)
Guidion House                    USA
Harvest Crescent
                                 www.niap.nist.gov/cc-scheme
Ancells Park, Fleet
                                 National Information Assurance
Hants GU13 8UZ
                                 Partnership
Tel. +44 (0) 1252 778837
                                 100 Bureau Drive (Mailstop 8930)
Fax. +44 (0) 1252 811635
                                 Gaithersburg, MD 20899-8930, USA
Janet Scruby                     Tel. +1.301.975.2934
janet.scruby@syntegra.bt.co.uk   Fax. +1.301.948.0279



                                                                         9
IACS – SMART CARDS


     MONDEX Purse 2.0                                     Multos v3 on Hitachi
                                                          H8/3112 ICC



     ITSEC E6                                             ITSEC E6
     Certificate Number: P129 September 1999              Certificate Number: P130 September 1999
     CLEF: Logica                                         CLEF: Logica



     The MONDEX Purse is an electronic purse              MULTOS is a secure, multi-application operating
     designed to provide individuals and businesses       system for use on an Integrated Circuit Card
     with an electronic alternative to the use of notes   (ICC) (smartcard), to manage, segregate and
     and coins for making cash payments. Mondex           execute applications written for MULTOS (such as
     electronic cash is stored on Integrated Circuit      loyalty, ticketing, credit, debit and electronic
     Cards (ICCs), also known as smartcards.              purse). This implementation of the MULTOS-3
     MONDEX Purse Release 2.0, developed by               specification, developed by platform seven and
     platform seven and Mondex International, has         Mondex International, has been evaluated on an
     been evaluated when running on MULTOS                Hitachi H8/3112 ICC. Applications are loaded by
     Version 3, (which has been separately evaluated      MULTOS into the ICC’s EEPROM. During the
     to ITSEC E6) and the Hitachi H8/3112 ICC.            production process, each ICC is injected with a
                                                          unique EEPROM identifier and a unique
                                                          symmetric key known only to the MULTOS
                                                          Security Manager. Once loaded, MULTOS ensures
                                                          that the application is segregated from any other
                                                          applications present on the card.




     SUPPLIER:                                            SUPPLIER:
     MAOSCO Ltd, 47-53 Cannon Street                      MAOSCO Ltd, 47-53 Cannon Street
     London EC4M 5SQ                                      London EC4M 5SQ
     Point of contact: David Meadon                       Point of contact: David Meadon
     Telephone: +44 20 7557 5420                          Telephone: +44 20 7557 5420
     Facsimile: +44 20 7557 5430                          Facsimile: +44 20 7557 5430
     Email:      customer.services@multos.com             Email:      customer.services@multos.com
     URL:        http://www.multos.com                    URL:        http://www.multos.com


     DEVELOPER:                                           DEVELOPER:
     Platform7, 6th Floor, 1-2 Finsbury Square            Platform7, 6th Floor, 1-2 Finsbury Square
     London EC2A 1AA                                      London EC2A 1AA
     Telephone: +44 (0) 20 7714 8492                      Telephone: +44 (0) 20 7714 8492
     Facsimile: +44 (0) 20 7714 8246                      Facsimile: +44 (0) 20 7714 8246
     URL:        http://www.platform7.com                 URL:        http://www.platform7.com
10
IACS – PC ACCESS CONTROL


KILGETTY PLUS NT4 v1.0                                 KILGETTY PLUS v1.2h
Government use only                                    Government use only




ITSEC E3                                               ITSEC E3
Certificate Number: P112, Issue 2 May 2000             Certificate Number: p105 November 1998
CLEF: EDS                                              CLEF: CMG Admiral



KILGETTY PLUS NT4 is a total hard disk                KILGETTY PLUS is a total disk encryption
encryption product, which protects government         product, which protects government data against
data (protectively marked up to TOP SECRET)           unauthorised access in the event of loss. For use
against unauthorised access in the event of loss.     with IBM compatible computers running
                                                      Microsoft DOS, Win 3.1 and Win 9x, all data that
KILGETTY PLUS NT4 is for use with IBM                 is held on the computer’s hard disk is fully
compatible computers running Microsoft                encrypted, including data structures, operating
Windows NT4, with hard disks up to 7.8GB in           system and applications. Access is via a touch
size. All data that is held on the computer’s hard    memory device (read by a reader attached to the
disk is fully encrypted, including data structures,   serial port), user identity and password.
operating system and applications. Access is via a
touch memory device (read by a reader attached        KILGETTY PLUS provides CESG approved
to the serial port), user identity and password.      protection for data protectively marked up to
                                                      TOP SECRET and is suitable for hard disks up
KILGETTY PLUS NT4 was evaluated on Microsoft          to 4GB.
Windows NT4 Server and Workstation versions
with Service Packs 3, 4, 5, and 6a.




The Software Box                                      The Software Box
Green Park Business Centre, Goose Lane                Green Park Business Centre, Goose Lane
Sutton on the Forest, York YO6 1ET                    Sutton on the Forest, York YO6 1ET
United Kingdom                                        United Kingdom

Point of Contact: The Security Group                  Point of Contact: The Security Group
Telephone: +44 (0) 1347 812100                        Telephone: +44 (0) 1347 812100
Email:     security_group@softbox.co.uk               Email:     security_group@softbox.co.uk
URL:       http://www.softbox.co.uk                   URL:       http://www.softbox.co.uk
                                                                                                          11
IACS – PC ACCESS CONTROL


     Portcullis Guardian Angel                           Reflex Disknet for NT
     v 5.01D1                                            v1.20




     ITSEC E2                                            ITSEC E2
     Certificate Number: 98/93 January 1998              Certificate Number: P125 July 1999
     CLEF: Syntegra                                      CLEF: Logica



     The security mechanisms of this pre-DOS loader      Reflex Disknet for Windows NT Data Security
     are designed to enforce PC access control for a     works by creating a “shield” around every system.
     hierarchy of users. The security barriers are       Disknet denies access to the hard disk if the
     imposed by:                                         target PC is booted from a floppy and the
     • Authentication using passwords encrypted by       system can be configured to prevent any booting
       an endorsed implementation of the CESG            from floppy if required. It prohibits users
       FIREGUARD algorithm.                              tampering with PC configurations and prevents
                                                         the introduction of unauthorised/illegal software.
     • User security profiles, auditing and a File
                                                         PSG module prevents modification or deletion of
       Access Control Matrix managing access to the
                                                         existing files, and prevents any changes to
       data.
                                                         applications. PSG will also prevent any
     • Blocking non-authenticated programs to            executable files being installed.
       prevent the introduction of malicious code
       (e.g. Viruses).
     • Disk certification preventing the use of floppy
       disks not formatted by Guardian Angel.
     • Encryption of data using an endorsed
       implementation of the CESG RED PIKE
       algorithm to protect files being exported or
       transmitted.




     Portcullis Computer Security Ltd                    Reflex Magnetics
     The Grange Barn, Pikes End                          31-33 Priory Park Road, London NW6 7HP
     Pinner, Middlesex HA5 2EX                           United Kingdom

     Point of contact: Alan Romanis                      Point of contact: Andy Campbell
     Telephone: +44 (0) 208 868 0098                     Telephone: +44 (0) 20 7372 6666
     Facsimile: +44 (0) 208 868 0017                     Facsimile: +44 (0) 20 7372 2507
     Email:     consult@portcullis-security.com          Email:     sales@reflex-magnetics.com
     URL:       http://www.portcullis-security.com       URL:       http://reflex-magnetics.com
12
IACS – PC ACCESS CONTROL


SeNTry 20/20                                         STOPLOCK V v2.23a
                                                     STOPLOCK VSC v2.23
                                                     STOPLOCK V SCenSOS v2.23a


COMMON CRITERIA EAL1                                 ITSEC E3
Certificate Number: P100 July 1998                   Certificate Number: 96/65a September 1996
CLEF: IBM Global Services                            CLEF: Logica



SeNTry 2020 enables users to store files securely   Stoplock V is a software based access control
by generating an encrypted virtual drive on the     package for use on IBM PCs and compatibles
host PC hard disk, access to which is restricted    running MS-DOS or Windows 3.x. It provides
via a passphrase. The virtual drive can be          tools for the controlling, monitoring and
formatted to either NTFS or FAT file systems and    protection of data. Stoplock V/Sc includes an
all files are encrypted in real-time. At any time   additional smartcard for user authentication and
the user can dismount the drive or if required,     user management, and Stoplock V SCenSOS
set an inactivity threshold for automatic           provides integration with the SCenSOS operating
dismount.                                           system for networked control and system
                                                    management.
The software can be installed on either a
Windows NT Server or NT Workstation                 The evaluated functions include:
(Version 4.0 SP3). The size of the virtual
                                                    • Identification and Authentication;
drive is limited by the OS and can utilise the
following encryption algorithms:                    • Access Control:

•   MDC/SHS                                           - enhanced boot protection
•   DC/RIPM                                           - access restrictions to files and directories
•   Cast                                              - rights defined by administrators only
•   Square
•   DES                                             • Trusted Processes defined by a privileged user.
•   MDC/SHA1                                        • Accountability and Audit:
•   Blowfish                                          - Audit trail of various events
•   Triple DES                                        - audit trail may only be accessed by privileged
•   Safer                                               users.




MIS Corporate Defence Solutions
MIS House, Hermitage Court                          Conclusive Logic Ltd
Hermitage Lane, Maidstone                           Babbage House, 55 King Street,
Kent ME16 9NT, United Kingdom                       Maidenhead, Berkshire SL6 1DU
                                                    United Kingdom
Telephone: +44 (0) 1622 723400                      Point of contact: Steve Mathews
Facsimile: +44 (0) 1622 728580                      Telephone: +44 (0) 1628 470900
Email:      uk.sales@mis-cds.com                    Facsimile: +44 (0) 1628 470901
URL:        http://mis-cds.com                      URL:       http://www.conclusive.com
                                                                                                         13
IACS – OPERATING SYSTEMS


     Argus B1/CMW                                        Argus B1/CMW
     v1.2 for Solaris 2.4                                v1.3.2 for Solaris 2.4

     Argus C2/TMW                                        Argus C2/TMW
     v1.2 for Solaris 2.4                                v1.3.2 for Solaris 2.4
     ITSEC E3 F-B1 CMW ITSEC E3 F-C2 TMW                 ITSEC E3 F-B1 CMW ITSEC E3 F-C2 TMW
     Certificate Number:                                 Certificate Number:
     96/73a (B1/CMW, x86 platform)                       99/89a (B1/CMW, x86 platform)
     December 1996                                       September 1999
     96/73b (C2/TMW, x86 and SPARC platforms)            99/89b (C2/TMW, x86 and SPARC platforms)
     December 1996                                       September 1999
     CLEF: CMG Admiral                                   CLEF: CMG Admiral


     The Argus TMW and CMW products are                  The Argus TMW and CMW products are
     workstation/server enhancements that bring an       workstation/server enhancements that bring an
     off-the-shelf Solaris 2.4 system up to labeled-C2   off-the-shelf Solaris 2.4 system up to labeled-C2
     and B1 level respectively. Each provides full       and B1 level respectively. Each provides full
     floating information label functionality. The CMW   floating information label functionality. The CMW
     product also provides mandatory access control      product also provides mandatory access control
     (MAC) based on sensitivity labels. Both support     (MAC) based on sensitivity labels. Both support
     labelled printing and a complete labelled X-        labelled printing and a complete labelled X-
     windows subsystem for system-high (TMW) and         windows subsystem for system-high (TMW) and
     multilevel (CMW) operations. Each can operate       multilevel (CMW) operations. Each can operate
     in either X-window or command-line mode for         in either X-window or command-line mode for
     desktop or server applications. The evaluation      desktop or server applications. The evaluation
     included trusted networking, trusted path, least    included trusted networking, trusted networked
     privilege, audit, and other functionality.          access, trusted path, least privilege, superuser
                                                         emulation, audit, and other functionality.




     Argus Systems Group, Inc.                           Argus Systems Group, Inc.
     1809 Woodfield Drive, Savoy, IL 61874, USA          1809 Woodfield Drive, Savoy, IL 61874, USA
     Point of contact: Paul A. McNabb                    Point of contact: Paul A. McNabb
     Telephone: +1 217 355 6308                          Telephone: +1 217 355 6308
     Facsimile: +1 217 355 1433                          Facsimile: +1 217 355 1433
     Email:     info@argus-systems.com                   Email:     info@argus-systems.com
     URL:       http://www.argus-systems.com             URL:       http://www.argus-systems.com
14
IACS – OPERATING SYSTEMS


Hewlett Packard                                       IBM DYNIX/ptx Unix
HP-UX 10.20                                           v4.1 SLS and 4.1a SLS on
                                                      Symmetry 5000 Systems
                                                      (models SE30 and SE40)


ITSEC E3 /CESG ASSISTED PRODUCTS SCHEME               ITSEC E3
Certificate Number: P111 February 1999                Certificate Number: 97/74 February 1997
CLEF: CMG ADMIRAL                                     CLEF: Logica



Hewlett-Packard’s HP-UX version 10.20 is an           DYNIX/ptx is a secure Operating System certified
X/Open UNIX 95 branded product, meaning that          to E3 F-C2, and is IBM’s enhanced version of
it conforms with X/Open’s Single UNIX                 UNIX for the Symmetry series of symmetric
Specification (SPEC1170). In addition HP-UX           multiprocessing systems. DYNIX/ptx conforms to
10.20 complies with such standards as X/Open          all the leading industry operating systems
                                                      standards, including IEEE POSIX 1003.1-1990,
Portability Guide Issue IV Base Profile (XPG4),
                                                      FIPS, X-Open, XPG4, Intel ABI+, OSF AES and
OSF AES, IEEE POSIX 1003.1 and 1003.2, SVID
                                                      USLSVID3. DYNIX/ptx includes specific support
3 level 1 APIs, as well as all major de facto APIs
                                                      for operations with concurrent user populations
such as BSD 4.3.
                                                      in excess of 1000 and disk volumes in excess of
                                                      1000GB. The hardware may be extended by
HP-UX 10.20 is designed to exceed the ITSEC F-        adding more processors with true linear
C2 functionality class, with the following notable    performance scalability.
extensions:
• Terminal-based User Authentication                  Three additional CESG modules are available for
• Time-based User Authentication                      use in HMG systems and may be applied for,
• Boot Authentication                                 namely FIRESTONE, THUNDERBOLT and
• Access Control Lists                                THUNDERFLASH password encryption and
                                                      generation packages.
• ‘Green Book’ compliant Password Management
  - generation & encryption


HP-UX 10.20 is supported across the full range
of HP9000 Workstations and Servers




Hewlett-Packard Ltd
Nine Mile Ride, Wokingham,
Berkshire RG40 3LL, United Kingdom


Point of contact: Christopher Simpson                 Point of contact: Valerie Ashton
Telephone: 01344-365029                               Telephone: +44 (0) 1932 851111
Facsimile: 01344-763747                               Facsimile: +44 (0) 1932 850011
Email:        christopher_simpson@hp.com              Email:     val_ashton@uk.ibm.com
URL:          http://www.hp.com/uk                    URL:
                                                                                                         15
IACS – OPERATING SYSTEMS


     IBM DYNIX/ptx                                      Microsoft Windows NT
     v4.4.2 running on Symmetry 5000                    Workstations and Win NT
     systems and NUMA-Q 2000                            Server 4.0


     ITSEC E3                                           ITSEC E3
     Certificate Number: P108V2 January 2000            Certificate Number: P121 March 1999
     CLEF: Logica                                       CLEF: Logica



     DYNIX/ptx Version 4.4.2 (with CESG algorithms)     Windows NT is a multi-tasking operating system
     is IBM’s enhanced version of UNIX running on       for controlling and managing networks of
     Symmetry 5000 systems (Model SE40) and             computers and electronic resources in a
     NUMA-Q (Non Uniform Memory Access) 2000            distributed multi-user environment. Trusted log
     (with EMC≈ Symmetrix 3430/3700 disk arrays)        on for user authentication, DAC of electronic
     and is evaluated to E3 F-C2.                       resources, accounting and audit of user activities,
                                                        and controlling system policies and user profiles
     DYNIX/ptx is a robust and reliable                 in arbitrary network configurations, including
     implementation of UNIX for secure commercial       interconnection of trusted domains, have been
     projects running enterprise level applications.    evaluated. The evaluated Windows NT 4.0 SP3
     DYNIX/ptx conforms to all the leading industry     security enforcing functions specified in its
     operating systems standards, including IEEE        Security Target provide the essential basis on
     POSIX 1003.1-1990, FIPS, X-Open, XPG4, Intel       which other specialised security enforcing
     ABI+, OSF AES and USLSVID3.                        functions of evaluatable systems such as
                                                        messaging, firewall, virtual private network, and
     Four optional CESG modules will be available for   PKI related systems could depend. Microsoft are
     use in HMG systems, namely FIREGUARD,              participating in the development of Common
     FIRESTONE, THUNDERBOLT and                         Criteria Protection Profiles of such systems.
     THUNDERFLASH password encryption and
     generation packages.




                                                        Microsoft Ltd
                                                        Microsoft Campus, Thames Valley Park,
                                                        Reading, Berks RG1 1WG, United Kingdom


     Point of contact: Valerie Ashton                   Point of contact: Peter Birch
     Telephone: +44 (0) 1932 851111                     Telephone: +44 (0) 870 6010 100
     Facsimile: +44 (0) 1932 850011                     Facsimile: +44 (0) 870 6020 100
     Email:     val_ashton@uk.ibm.com                   Email:     peterbir@microsoft.com
     URL:                                               URL:       http://www.microsoft.com/uk
16
IACS – OPERATING SYSTEMS


Sun Solaris 2.6                                     Sun Solaris
Certificate Maintenance Scheme                      v8 with AdminSuite v 3.0.1




ITSEC E3                                            COMMON CRITERIA EAL4
Certificate Number: P101 January 1999               Certificate Number: P148 November 2000
CLEF: Logica                                        CLEF: Logica



Solaris 2.6 is the latest version of Sun’s          Solaris 8 is a UNIX-based operating system which
commercial Solaris operating system evaluated to    can be configured from a number of
ITSEC E3/F-C2. The product was initially            workstations and servers to form a single
evaluated on the Sun UltraSPARC-1 Workstation       distributed system. AdminSuite 3.0.1 provides
and servers sharing information in a distributed    tools to configure security aspects of Solaris 8.
networking environment. The evaluation includes     Both Solaris 8 and AdminSuite 3.0.1 have been
the following features in addition to the ITSEC     developed by Sun Microsystems Inc. Solaris 8,
Functionality Class F-C2:                           with AdminSuite 3.0.1, has been certified as
• CDE window system                                 meeting the Common Criteria Part 3 conformant
• Networking utilising the TCP/IP protocol          requirements of EAL4 for the specified Common
• NIS+ Distributed Naming Service                   Criteria Part 2 extended functionality in the
• NFS                                               specified environment when running on the
                                                    specified Sun SPARC and Intel Pentium
In February 1999, Sun entered into the              platforms. It has also met the requirements of
Certificate Maintenance Scheme and                  the Controlled Access Protection Profile.
evaluation is extended to a wide range of Sun
platforms, from uni-processor MicroSPARC
workstations to multi-processor UltraSPARC
Enterprise servers.




Sun Microsystems Inc                                Sun Microsystems Inc
MPK 18-211 rm 2295, 901 San Antonio Road,           MPK 18-211 rm 2295, 901 San Antonio Road,
Palo Alto, CA 94303, USA                            Palo Alto, CA 94303, USA


Point of contact :                                  Point of contact :
Telephone:                                          Telephone:
Facsimile: +1 650 786 5731                          Facsimile: +1 650 786 5731
Email:   Solaris-Security-Target@Eng.Sun.Com        Email:   Solaris-Security-Target@Eng.Sun.Com
URL:     http://www.sun.com/security                URL:     http://www.sun.com/security
                                                                                                        17
IACS – OPERATING SYSTEMS


     Trusted Solaris 2.5.1
     Certificate Maintenance Scheme




     ITSEC E3
     Certificate Number: P104 September 1998
     CLEF: Logica



     Trusted Solaris 2.5.1 is a highly configurable
     trusted operating system based on Sun’s Solaris
     2.5.1 commercial UNIX operating system. It is
     designed to meet the specific security needs of
     customer seeking evaluated security systems.
     Trusted Solaris supports ITSEC E3/F-B1 and
     ITSEC E3/F-C2 with the following major features,
     all of which were included in the evaluation:
     • MAC, DAC and information labels;
     • Least privilege;
     • Full identification and authentication facilities,
        including password generation;
     • Separate trusted administration and security
        roles;
     • Graphical User Interface administration tools;
     • Centralised Trusted Facilities Management;
     • NIS+ Naming service;
     • Secure CDE Windowing environment with
        support for X11R5 and Motif;
     • Trusted Networking using TCP/IP and TSIX or
        MASIX protocols;
     • Trusted NFS;
     • Auditing;
     • Multi-level mail.




     Sun Microsystems Inc
     MPK 18-211 rm 2295, 901 San Antonio Road,
     Palo Alto, CA 94303, USA


     Point of contact:
     Telephone:
     Facsimile: +1 650 786 5731
     Email:   Solaris-Security-Target@Eng.Sun.Com
     URL:     http://www.sun.com/security
18
IACS – NETWORKING


Authoriszor Secure Extranet                          Entrust/Admin &
Access Management System                             Entrust/Authority from
                                                     Entrust/PKI 4.0a


IN EVALUATION COMMON CRITERIA EAL4                   COMMON CRITERIA EAL3
Projected Certification Date: July 2001              Certificate Number: P122 March 1999
CLEF: IBM Global Services                            CLEF: Syntegra



Authoriszor been developed to provide a secure       Entrust/Authority is the core component of an
HTTP page delivery system which publishes            Entrust public-key infrastructure. Acting as the
WWW pages via Microsoft Internet Information         Certification Authority (CA), Entrust/Authority
Server. Content is protected from attack by          issues X.509 public-key certificates and performs
storing it in a location that is inaccessible from   key and certificate management functions.
the Internet whilst webroot is constantly            Other Entrust/Authority capabilities include the
monitored to protect against file deposition or      ability to cross-certify with other CAs, the use of
modification attacks.                                flexible certificates (for including X.509v3
                                                     certificate extensions), and the use of flexible
The optional client support allows web content       user password rules.
to be delivered, on demand, in strict accordance
with a client’s pre-defined security profile.        Entrust/Admin is an administrative interface to
                                                     Entrust/Authority and allows operators to
It provides a Management System that will allow:     manage users, set the security policy, and control
• Multiple site support;                             the PKI. All messages between Entrust/Admin
• Positive Identification of clients;                and Entrust/Authority are secured for
• Definition of security profiles for clients        confidentiality, integrity, and authentication.
   and content;
• Activity logging.




Authoriszor Ltd                                      Entrust Technologies Ltd.
Windsor House, Cornwall Rd                           1000 Innovation Drive, Ottawa, Ontario, Canada,
Harrogate HG1 2PN, United Kingdom                    K2K 3E7


Point of contact: Richard Atkinson                   Point of contact: Darryl Stal
Telephone: +44 (0) 1423 730300                       Telephone: (613) 270-3483
Facsimile: +44 (0) 1423 730315                       Facsimile: (613) 270-2503
Email:     richard.atkinson@authoriszor.com          E-mail:    entrust@entrust.com
URL:       http://www.authoriszor.com                URL:       http://www.entrust.com
                                                                                                           19
IACS – NETWORKING


     Entrust/RA from Entrust/PKI                          Entrust/RA from Entrust/PKI
     5.0                                                  5.1



     COMMON CRITERIA EAL3                                 COMMON CRITERIA EAL3
     Certificate Number: P141 March 2000                  Certificate Number: P153 February 2001
     CLEF: Syntegra                                       CLEF: Syntegra



     Entrust/RA 5.0 is an administrative interface to     Entrust/RA 5.1 is an administrative interface to
     Entrust/Authority and allows operators to            Entrust/Authority and allows operators to
     manage users, set the security policy, and control   manage users, set the security policy, and control
     the PKI. Security Officers and Administrators        the PKI. Security Officers and Administrators
     connecting to Entrust/Authority authenticate         connecting to Entrust/Authority authenticate
     themselves using digital signatures.                 themselves using digital signatures.
     Once complete, all messages between                  Once complete, all messages between
     Entrust/RA and Entrust/Authority are then            Entrust/RA and Entrust/Authority are then
     secured for confidentiality, integrity, and          secured for confidentiality, integrity, and
     authentication. Cryptographic operations for         authentication. Cryptographic operations for
     Entrust/RA are performed in the FIPS 140-1           Entrust/RA are performed in the FIPS 140-1
     Level 2 validated Entrust cryptographic module.      Level 2 validated Entrust cryptographic module.
     Entrust/RA is currently certified on Microsoft       Entrust/RA is being evaluated on Microsoft
     Windows NT 4.0 Service Pack 3.                       Windows NT 4.0 Service Pack 6a.




     Entrust Technologies Ltd.                            Entrust Technologies Ltd.
     1000 Innovation Drive, Ottawa, Ontario, Canada,      1000 Innovation Drive, Ottawa, Ontario, Canada,
     K2K 3E7                                              K2K 3E7


     Point of contact: Darryl Stal                        Point of contact: Darryl Stal
     Telephone: (613) 270-3483                            Telephone: (613) 270-3483
     Facsimile: (613) 270-2503                            Facsimile: (613) 270-2503
     E-mail:    entrust@entrust.com                       E-mail:    entrust@entrust.com
     URL:       http://www.entrust.com                    URL:       http://www.entrust.com
20
IACS – NETWORKING


Entrust/Authority from                                Entrust/Authority from
Entrust/PKI 5.0                                       Entrust/PKI 5.1



COMMON CRITERIA EAL3                                  COMMON CRITERIA EAL3
Certificate Number: P141 March 2000                   Certificate Number: P153 February 2001
CLEF: Syntegra                                        CLEF: Syntegra



Entrust/Authority 5.0 is the core component of        Entrust/Authority 5.1 is the core component of
an Entrust public-key infrastructure. Acting as       an Entrust public-key infrastructure. Acting as
the Certification Authority (CA), Entrust/Authority   the Certification Authority (CA), Entrust/Authority
issues X.509 public-key certificates and performs     issues X.509 public-key certificates and performs
key and certificate management functions.             key and certificate management functions.
Other Entrust/Authority capabilities include the      Other Entrust/Authority capabilities include the
ability to cross-certify with other CAs, the use of   ability to cross-certify with other CAs, the use of
flexible certificates (for including X.509v3          flexible certificates (for including X.509v3
certificate extensions), the use of flexible user     certificate extensions), the use of flexible user
password rules, the ability to specify either RSA     password rules, the ability to specify either RSA
(1024 or 2048) or DSA 1024 as the CA signing          (1024 or 2048) or DSA 1024 as the CA signing
algorithm and CA signing key size, and the ability    algorithm and CA signing key size, and the ability
to renew the CA signing key pair before it expires    to renew the CA signing key pair before it expires
and to recover from possible CA key                   and to recover from possible CA key
compromise.                                           compromise.




Entrust Technologies Ltd.                             Entrust Technologies Ltd.
1000 Innovation Drive, Ottawa, Ontario, Canada,       1000 Innovation Drive, Ottawa, Ontario, Canada,
K2K 3E7                                               K2K 3E7


Point of contact: Darryl Stal                         Point of contact: Darryl Stal
Telephone: (613) 270-3483                             Telephone: (613) 270-3483
Facsimile: (613) 270-2503                             Facsimile: (613) 270-2503
E-mail:    entrust@entrust.com                        E-mail:    entrust@entrust.com
URL:       http://www.entrust.com                     URL:       http://www.entrust.com
                                                                                                            21
IACS – NETWORKING


     Remote Management Centre                             Luna® CA3 Token




     ITSEC E1                                             IN EVALUATION COMMON CRITERIA EAL4
     Certificate Number: S115 January 2001                Projected Certification Date: 1 July 2001
     CLEF: CMG Admiral                                    CLEF: SYNTEGRA



     IBM Remote Management Centre provides a              The Luna® CA3 Token, Luna® Dock Card Reader,
     focal point for Remote Network Management,           and Luna® PIN Entry Device combine to provide
     Remote Systems Management and Remote                 a robust hardware security module for
     Environmental Monitoring. The security of the        Certification Authorities, Certification Service
     unit allows multiple customers to be managed         Providers and Validation Authorities within Public
     from a central location whilst maintaining the       Key Infrastructures. The product provides secure
     integrity of the individual networks and mission     generation, storage, access control and backup
     critical systems. The service allows RMC staff to    of the private signing key of the Authority.
     integrate with customers’ networks in a secure       It provides advanced security features such as
     manner using a combination of authentication,        trusted path for entry of authentication data,
     auditing and accounting incorporated into the        M of N activation for multi-person control of
     secure LAN. Several technologies are employed,       critical operations and Luna® Key Cloning for
     including firewalls, controlled access lists, user   secure backup of private keys and other
     authentication and monitoring. The individual        sensitive data.
     customers monitoring stations integrate into this
     secure environment allowing display of individual
     alarms on a centralised videowall.




                                                          Chrysalis-ITS
     IBM                                                  One Chrysalis Way, Ottawa, ON
     Weybridge Business Park, Addlestone Road,            K2G 6P9, Canada
     Weybridge, Surrey, KT15 2UF,
     United Kingdom                                       Point of contact: Terry Fletcher, VP Trusted
                                                                           Systems Engineering
     Point of contact: David Stacey                       Telephone: 613 723-5076
     Telephone: +44 (0) 1932 851111                       Facsimile: 6I3 723 5078
     Facsimile: +44 (0) 1932 814333                       Email:     sales@chrysalis-its.com
     Email:     davidstacey@uk.ibm.com                               tfletcher@chrysalis-its.com
     URL:       http://www.uk.ibm.com                     URL:       http://www.chrysalis-its.com
22
IACS – NETWORKING


SureWare KeyPer v1.0                                 SureWare Net ED20M




ITSEC E3                                             IN EVALUATION ITSEC E3 and CAPS
Certificate Number: P154 March 2001                  Projected Certification Date: December 2001
CLEF: IBM Global Services                            CLEF: IBM Global Services



SureWare Keyper is a hardware cryptographic          The SureWare Net ED20M is an Ethernet VPN
module that guarantees the safety and integrity of   encryptor that allows users to communicate
key material. SureWare Keyper has been awarded       protectively marked material across untrusted
FIPS 140-1 level 4. It connects to a host            networks by using cryptographic mechanisms to
computer via standard networking technology in       lower the marking of the actual network traffic.
order to provide secure cryptographic services to
host computer applications:                          Features:
• Key Generation                                     • Transfer of encrypted user data IP datagrams
• Encryption                                           between pairs of encryptors
• Message Authentication Code                        • Configurable security policy for authorising IP
• Signing                                              addresses and protocols
                                                     • Automated key management
These applications will communicate with             • Audit trail of events
SureWare Keyper via the industry standard            • Local and remote management options
interface PKCS#11.                                   • Security enforcing remote management
                                                       communications protected cryptographically
The scope of the evaluation covered those            • Authenticated local management
mechanisms that protect the cryptographic            • Operational and standby modes
services that the TOE provides. Triple DES and       • Tamper resistant crypto-kernel
SHA-1 contained within the TOE are publicly          • Operation with Ethernet V2.0 and IEEE 802.3
known. Other cryptographic services provided           with SNAP headers
such as RSA and Diffie Hellman, were outside the
scope of the evaluation.




Baltimore Technologies Ltd                           Baltimore Technologies Ltd
39/41 Parkgate Street, Dublin 8, Ireland             39/41 Parkgate Street, Dublin 8, Ireland
Point of contact:                                    Point of contact:
Telephone: +61 2 9409 0300                           Telephone: +61 2 9409 0300
Facsimile: +61 2 9409 0301                           Facsimile: +61 2 9409 0301
Email:     info@baltimore.com                        Email:     info@baltimore.com
URL:       http://www.baltimore.com                  URL:       http://www.baltimore.com
                                                                                                         23
IACS – NETWORKING                                                     IACS – FIREWALLS


     Tracker 2650 Data Collection                         BorderWare Firewall Server
     Unit                                                 v6.1.2




     ITSEC E2                                             COMMON CRITERIA EAL4
     Certificate Number: P133 March 2000                  Certificate Number: P136 January 2000
     CLEF: Logica                                         CLEF: Syntegra



     Tracker is an intelligent modem that reliably logs   The BorderWare Firewall server’s EAL4
     data in 32 Megabytes of battery backed memory        certification covers the integrated operating
     until polled. It receives data on four RS232         system and a completed set of the facilities
     ports that can also be used for transparent two-     needed to operate a secure and effective Internet
     way communication with the data source. It will      connection. The Firewall’s operating system
     dial out when it detects alarm conditions.           (S-CORE) is hardened to protect against known
                                                          vulnerabilities and to provide a secure platform
     When used in a network management system,            for the extensive set of application proxies that
     Tracker prevents subscribers on a switch from        control information flow through the Firewall.
     gaining access to the remote management              The proxies are complimented with application
     system and provides assured separation between       server for E-mail, FTP, WWW and dual DNS.
     subscribers and management traffic. It also          The integrated Mail server can be configured to
     protects the switch from unauthorised access         provide a complete e-mail system or operate as a
     when replacing diagnostic modems.                    relay delivering mail to protected internal servers.

     This product was evaluated for the MOD’s
     Defence Fixed Telecommunications Service.




     Data Track Technology plc
     153 Somerford Road
     Christchurch
     Dorset BH23 3TY
     United Kingdom                                       BorderWare Technologies Inc
                                                          1 The Harlequin Centre, Southall Lane,
     Point of contact: Mike Terry, Business               Southall, Middlesex UB2 5NH, United Kingdom
                      Development Manager                 Point of contact:
     Telephone: +44 (0) 1425 282022                       Telephone: +44 (0) 20 8893 6066
     Facsimile: +44 (0) 1425 271978                       Facsimile: +44 (0) 20 8574 8384
     Email:     mterry@dtrack.com                         Email:      info@borderware.com
     URL:       http://dtrack.com                         URL:        http://www.borderware.com
24
IACS – FIREWALLS


BorderWare Firewall Server                             Check Point Firewall-1
v6.5                                                   v4.0 Stateful Inspection




IN EVALUATION COMMON CRITERIA EAL4                     ITSEC E3
PROJECTED CERTIFICATION DATE: 3Q 2001                  Certificate Number: P107 March 1999
CLEF: Syntegra                                         CLEF: CMG Admiral



The BorderWare Firewall includes an integrated         This evaluation addresses the core elements of
operating system and a completed set of services       Firewall-1 i.e. the Stateful Inspection engine,
needed to operate a secure and effective Internet      auditing, address translation and the command-
connection. The Firewall’s operating system            line user interface for Microsoft NT Version 4.0
(S-CORE) is hardened to protect against known          SP 3, Solaris 2.6, AIX version 4.2.1 and HP-UX
vulnerabilities and to provide a secure platform       Version 10.10.
for the extensive set of application proxies that
control information flow through the Firewall.         The Firewall-1 product suite delivers an
The proxies are complimented with application          integrated solution that scales to meet the
server for E-mail, FTP, WWW and dual DNS.              demands of organizations large and small,
The integrated Mail server can be configured to        securing your enterprise network – LAN, Internet,
provide a complete e-mail system or operate as a       intranet and extranets.
relay delivering mail to protected internal servers.
V6.5 of the Firewall server will be available both     Based on Stateful Inspection technology, a
packaged on dedicated hardware and as a                security technology invented and patented by
complete software package for easy installation        Check Point Software Technologies, FireWall-1
on standard hardware.                                  provides security at the highest level currently
                                                       available. Stateful Inspection incorporates
                                                       communication, application state and context
                                                       information, which is stored and updated
                                                       dynamically.




BorderWare Technologies Inc                            Check Point Software Technologies Ltd
1 The Harlequin Centre, Southall Lane,                 3A Jabotinsky St., Diamond Tower,
Southall, Middlesex UB2 5NH, United Kingdom            Ramat-Gan 52520, Israel
Point of contact:                                      Point of contact: Nigel Mould
Telephone: +44 (0) 20 8893 6066                        Telephone: +44 (0) 1223 713611
Facsimile: +44 (0) 20 8574 8384                        Facsimile: +44 (0) 1223 713621
Email:     info@borderware.com                         Email:     nigelm@checkpoint.com
URL:       http://www.borderware.com                   URL:       http://www.checkpoint.com
                                                                                                           25
IACS – FIREWALLS


     Check Point VPN-1/Firewall-1                        Cisco Secure PIX Firewall
     v4.1 SP2                                            Software
                                                         Version 5.2(3)
                                                         Hardware Models 515, 520 & 525

     ITSEC E3                                            COMMON CRITERIA EAL4
     Certificate Number: P149 January 2001               Certificate Number: P152 January 2001
     CLEF: CMG Admiral                                   CLEF: Syntegra



     This evaluation addresses the core elements of      The Cisco Secure PIX Firewall is a dedicated
     Firewall-1, but also includes the Graphical User    firewall appliance from Cisco Systems. The family
     Interface, Remote Management, Authentication,       of firewalls delivers strong security without
     Encryption and LDAP interface for FireWall-1        impacting network performance. The product
     Version 4.1 running on Microsoft NT Version 4.0     line scales to meet a range of customer
     SP 5, Solaris 2.6 and AIX Version 4.3.              requirements, and has only two license levels -
                                                         one restricted licence and an unlimited licence.
     VPN-1/FireWall-1 is the most comprehensive
     security suite available today. Providing an        The PIX Firewall is an integrated unit and does
     integrated solution that scales to meet the         not have an underlying operating system such as
     demands of organizations large and small,           NT or UNIX, and this increases security and
     securing your enterprise network – LAN, Internet,   performance. The PIX 525 is able to support over
     intranet and extranets.                             340Mbps of throughput and over 250,000
                                                         concurrent sessions.
     VPN-1/Firewall-1 is the center of an extensive
     policy management framework. The intuitive GUI
     is used to write the enterprise security policy,
     which is then applied to all remote or internal
     gateways.




     Check Point Software Technologies Ltd               Cisco Systems
     3A Jabotinsky St., Diamond Tower,                   3, The Square, Stockley Park,
     Ramat-Gan 52520, Israel                             UXBRIDGE, Middlesex UB11 1BN
     Point of contact: Nigel Mould                       Point of contact: Paul King
     Telephone: +44 (0) 1223 713611                      Telephone: +44 (0) 20 8756 8349
     Facsimile: +44 (0) 1223 713621                      Facsimile: +44 (0) 20 8576 8099
     Email:     nigelm@checkpoint.com                    Email: securitysolutions@cisco.com
     URL:       http://www.checkpoint.com                URL: http://www.cisco.com/uk/securitysolutions
26
IACS – FIREWALLS


CyberGuard Firewall for                             CyberGuard Firewall for
Windows NT                                          UnixWare 4.1
Certificate Maintenance Scheme                      (also available as CyberGuard Firewall
                                                    Appliances) Certificate Maintenance
                                                    Scheme
The latest CMS Approved version of CyberGuard       The latest CMS Approved version of
Firewall for Windows NT is 4.2 PSU1. All            CyberGuard Firewall for UnixWare 4.1 is 4.2
intermediate releases and updates are also CMS      PSU1. All intermediate releases and updates
approved.                                           are also CMS approved.
ITSEC E3                                            ITSEC E3
Certificate Number: P118 January 1999               Certificate Number: P117 January 1999
CLEF: Logica                                        CLEF: Logica



CyberGuard Firewall for Windows NT is closely       CyberGuard® Firewall for UnixWare® is provided
linked to Microsoft Windows NT® to maximise         with a MLS UNIX operating system. It safeguards
performance, accuracy and security of the           information held on internal networks, by
network. The evaluated firewall is a multi-homed    controlling the access of external users and
configuration providing both IP packet filtering    protecting the integrity, availability, authentication
and application-level proxies. A Graphical User     data and anonymity of the internal network.
Interface (GUI) for configuration and reporting     Configuration and Reporting is performed with a
and up to 16 multiple network interfaces are        local Graphical User Interface (GUI). Additional
available. To ease installation and management,     network interfaces (up to 32) provide DMZ or
the firewall interacts with and exploits existing   further internal/ external network connections.
NT domain controllers to obtain user and            The firewall runs on either single or multi-
authentication information. The Windows NT          processor Intel servers with UnixWare 2.1.3.
environment is secured with SecureGuard™for         CyberGuard Firewall for UnixWare is available
NT, providing protection against security threats   from Release 4.2 onwards as a pre-staged
such as uncontrolled access to system resources.    appliance known as FireSTAR, KnightStar and
Available for systems with a minimum of             STARLord Premium Appliance Firewalls.
133MHz Intel Pentium Processor, 32MB Memory         These variants are therefore CMS Approved.
running Windows NT rev 4.0 with Service Pack 3
or 4.




CyberGuard Europe Ltd                               CyberGuard Europe Ltd
Asmec Centre, Eagle House, The Ring,                Asmec Centre, Eagle House, The Ring,
Bracknell, Berkshire RG12 1HB                       Bracknell, Berkshire RG12 1HB
Point of contact: Andrew Clarke                     Point of contact: Andrew Clarke
Telephone: + 44 (0)1344 382550                      Telephone: + 44 (0)1344 382550
Facsimile: + 44 (0)1344 382551                      Facsimile: + 44 (0)1344 382551
Email:     aclarke@cyberguard.com                   Email:      aclarke@cyberguard.com
URL:       http://www.cyberguard.co.uk              URL:        http://www.cyberguard.co.uk
                                                                                                             27
IACS – FIREWALLS


     CyberGuard Firewall v2                               CyberGuard Firewall for
     Certificate Maintenance Scheme                       UnixWare/Premium
     CyberGuard Firewall 2.2.1e has CMS                   Appliance Firewall 4.3
     approved versions up to CyberGuard Firewall
     2.2.3r9.

     ITSEC E3                                             COMMON CRITERIA EAL4
     Certificate Number: 97/78 March 1997                 Certificate Number: P150 December 2000
     CLEF: Logica                                         CLEF: Logica



     CyberGuard Firewall Version 2 is an appliance        CyberGuard Firewall is a packet filter, (stateful
     firewall that controls and monitors user access to   inspection) and application level proxy firewall
     local- and wide-area networks by leveraging the      provided with a MLS (secure) Unix operating
     advantages of a multi-level secure architecture.     system. It safeguards internal networks by
     CyberGuard Firewall runs on B1 secure operating      controlling external access and protects the
     system and networking products. CyberGuard is        integrity, availability, authentication data and
     designed to reduce the area of risk to a single      anonymity of the internal network.
     system; it operates as a packet-filtering gateway,   Configuration/reporting is performed via local
     a proxy gateway and a Bastion Host in a multi-       GUI. Additional interfaces (up to 32) provide
     system environment. For example, when located        DMZ or further internal/external connections.
     between an internal network, an Intranet and/or      Evaluated security features include: Connection
     the internet, it provides valuable protection of a   level Access Control for IP packets; Accounting,
     company’s computing resources and data.              auditing and statistics; Alerts for security events;
     CyberGuard Firewall has been evaluated on both       Network Address Translation and Split Domain
     the NH4000 and NH5000 platforms, in either           Name Server (DNS). The firewall runs on single
     tower or rack-mounted packaging.                     or multi-processor Intel IA-32 processors and as
                                                          a packaged solution – the CyberGuard Premium
                                                          Appliance family: FireSTAR, KnightSTAR and
                                                          STARLord.




     CyberGuard Europe Ltd                                CyberGuard Europe Ltd
     Asmec Centre, Eagle House, The Ring,                 Asmec Centre, Eagle House, The Ring,
     Bracknell, Berkshire RG12 1HB                        Bracknell, Berkshire RG12 1HB
     Point of contact: Andrew Clarke                      Point of contact: Andrew Clarke
     Telephone: + 44 (0)1344 382550                       Telephone: + 44 (0)1344 382550
     Facsimile: + 44 (0)1344 382551                       Facsimile: + 44 (0)1344 382551
     Email:     aclarke@cyberguard.com                    Email:      aclarke@cyberguard.com
     URL:       http://www.cyberguard.co.uk               URL:        http://www.cyberguard.co.uk
28
IACS – FIREWALLS


Gauntlet Internet Firewall                         MailGuard Bastion 1.0
for Windows NT
v3.01



ITSEC E3                                           ITSEC E3
Certificate Number: P127 June 1999                 Certificate Number: P144 May 2000
CLEF: EDS                                          CLEF: Admiral



The Gauntlet Internet Firewall for Windows NT is   MailGuard Bastion is a high assurance messaging
a native development for Windows NT 4.0.           firewall that allows the exchange of X.400 and
The Gauntlet Internet Firewall for Windows NT      SMTP/MIME messages between networks of
combines an application gateway with user          differing security levels or conflicting security
transparency and ease of management. Security      policies.
functions evaluated include:
• Prevention of internal IP addess spoofing;       MailGuard Bastion is evaluated and assured to
• System integrity checking;                       ITSEC E3, making it ideally suited to meet the
• Comprehensive auditing and accounting            most stringent security policies. The product
  functions;                                       builds upon the Trusted Solaris operating system,
• Alarms raised to the Administrator on defined    which itself is ITSEC E3/F-B1 and E3/F-C2
  events;                                          approved. MailGuard Bastion can be supplied as
• Packet level filtering;                          a software package or as a turnkey system
• SMTP, telnet, rlogin, HTTP, ftp, SQL*net, pop3   (comprising hardware and software) configured
  and PLUG proxies;                                and working to requirements.
• Strong user Authentication with the ability to
  insert user definable mechanisms;
• Configurable option to prevent JAVA applets,
  JAVA scripts and ActiveX;
• URL filtration mechanisms;
• Content Vectoring Protocol support.




                                                   NET-TEL Computer Systems Ltd
Network Associates – UK                            4 Place Farm, Wheathampstead
227 Bath Road, Slough, Berkshire SL1 5PP           Herts AL4 8SB, United Kingdom
Point of contact: Evan Garricks                    Point of contact: Nick Ward
Telephone: +44 (0) 1753 217 500                    Telephone: +44 1582 830500
Facsimile: +44 (0) 1753 217 520                    Facsimile: +44 1582 830501
Email:     evan_garricks@nai.com                   Email:     Nick.Ward@net-tel.co.uk
URL:       http://www.nai.com                      URL:       http://mailguard.co.uk
                                                                                                       29
IACS – FIREWALLS


     Safegate v2.0.2                                    SWIPSY Firewall Toolkit




     COMMON CRITERIA EAL3                               ITSEC E3
     Certificate Number: P139 January 2000              Certificate Number: P147 August 2000
     CLEF: Logica                                       CLEF: EDS



     Safegate (Version 2.0.2) firewall has the          The SWIPSY (Switch IP SecurelY) firewall toolkit
     following functions:                               provides an extensible framework for
     • IP packet filtering;                             constructing assured Bastion Host firewalls.
     • application gateway (non-transparent and
       transparent);                                    SWIPSY is based on a stripped down
     • security management (containing the audit        configuration of Sun’s Trusted Solaris (TSol) 2.5.1
       functions);                                      operating system. By relying on the mandatory
                                                        access controls of TSol, SWIPSY provides strong
     IP packet filtering permits or denies the          separation between networks. Controlled
     transmission of IP packets through Safegate from   communication between networks can be
     the hostile network and the private network        configured, using either a filestore or a TCP/UDP
     according to filtering rules defined by an         interface.
     authorised administrator. The transparent
     gateway (TCP, UDP, ICMP, FTP, Telnet and various   Third party proxies such as Squid or Message
     multimedia services) allows a direct connection    Transfer Agents may be integrated, without the
     between a client on the private network and a      need for re-evaluation, to achieve an E3 firewall,
     host on the Internet. The non-transparent          although formal evaluation of the software may
     gateway (only FTP and Telnet services) allows      be necessary if certain TSol privileges are needed.
     simultaneous sessions between the client on the
     private network and the Internet host.




                                                        Central Enquiry Desk
                                                        Defence Evaluation and Research Agency,
     Fujitsu Ltd                                        Ively Road, Farnborough, Hampshire GU14 0LX,
     1405, Ohmaru, Inagi-shi,                           United Kingdom
     Tokyo 206-8503, Japan                              Point of contact: Sharon Lewis
     Point of contact: Takehiko Yahagi                  Telephone: +44 1684 896535
     Telephone: +81 44 370 7637                         Facsimile: +44 1684 896660
     Facsimile: +81 44 370 7737                         Email:     S.Lewis@eris.dera.gov.uk
     Email:        t-yahagi@jp.fujitsu.com              URL: http://www.dera.gov.uk/html/it/secure-e-
     URL:          http://www.fujitsu.co.jp/en/              business/network_boundary_service.htm
30
IACS – FIREWALLS


Symantec Enterprise Firewall                          VCS Firewall v3.0
v6.5




IN EVALUATION COMMON CRITERIA EAL4                    COMMON CRITERIA EAL1
Projected Certification Date: July 2001               Certificate Number: P123 March 1999
CLEF: Syntegra                                        CLEF: IBM Global Services



Symantec Enterprise Firewall provides complete        The VCS Firewall manages data and
perimeter protection by integrating application       communications between trusted and untrusted
proxies, network circuits and packet filtering into   networks. It supports four independent networks
its hybrid architecture. Its intuitive management     and can manage simultaneously traffic between
and high-performance characteristics work             all pairs of networks. The VCS Firewall is proxy-
together comprising the most secure,                  based. Proxies for HTTP, Telnet, FTP and Mail
manageable, flexible firewall for enterprise          Exchange, as well as a Generic proxy for all other
protection. Integrated components, such as            proxiable protocols, are included. Packet filtering
application proxy architecture and a multi-firewall   of TCP, UDP and ICMP is also supplied.
management GUI enable the Symantec Enterprise         All configuration of the VCS Firewall is by way of
Firewall to address the broad perimeter security      a Graphical User Interface. This makes the VCS
needs of companies connecting to the Internet.        Firewall easy to configure, as well as providing
Some of the features unique to the Symantec           sanity checking on the configuration.
Enterprise Firewall include:
(1) initial & continuous system hardening,
(2) DDoS attack protection,
(3) support for authenticating sessions,
(4) consolidated, non-order-dependent rule
    setting, and
(5) generic and port-range service proxies
    supporting legacy, proprietary or emerging
    protocols.




                                                      The Knowledge Group
SYMANTEC Corporation                                  Knowledge House, Concorde Road,
266 Second Avenue, Waltham,                           Patchway, Bristol BS34 5TB, United Kingdom
Massachusetts 02451
Point of contact: Regina Hammond                      Point of contact: Alan Jones
Telephone: +1 781-530-2305                            Telephone: +44 (0) 117 900 7500
Facsimile: +1 781-487-6755                            Facsimile: +44 (0) 117 900 7501
Email:     rhammond@symantec.com                      Email:
URL:       http://www.symantec.com                    URL:       http://www.ktgroup.co.uk
                                                                                                            31
IACS – COMMUNICATIONS


     Baltimore ED2048R3                                    Baltimore ED600RTS
     Government Use Only




     ITSEC E3 and CAPS approved                            ITSEC E3 and CAPS approved
     Certificate Number: 96/60 April 1996                  Certificate Number: 95/55 September 1995
     CLEF: IBM Global Services                             CLEF: Syntegra



     The ED2048R3 provides cryptographic                   The ED600RTS is a RAMBUTAN Encryptor for
     protection for up to 2.048 Mbps point-to-point        synchronous data transmitted on a point-to-point
     links. The ED2048R3 has 2 interface options:          link, at speeds of up to 128 Kbps using an X.21
     • X21                                                 interface. The ED2048R3 offers a two-tier key
     • G.703/G.732/G704                                    hierarchy. Four data encryption keys (DEKs) can
     The X.21 interface is suited to protecting flexible   be entered into the master encryptor from a
     bandwidth services as line speeds                     swipe card and downloaded over the link to slave
     can be increased without reconfiguration.             units. Alternatively, the ED2048R3 can be
     The G704 interfaces support an nx64 Kbps              managed from the Baltimore Network Security
     fractional service.                                   Workstation, to provide automated key and
                                                           equipment management
     The ED2048R3 offers a two-tier key hierarchy.
     Four data encryption keys (DEKs) can be entered
     into the master encryptor from a swipe card and
     downloaded over the link to slave units.
     Alternatively, the ED2048R3 can be managed
     from the Baltimore Network Security
     Workstation, to provide automated key and
     equipment management.




     Baltimore Technologies Ltd                            Baltimore Technologies Ltd
     39/41 Parkgate Street, Dublin 8, Ireland              39/41 Parkgate Street, Dublin 8, Ireland
     Point of contact:                                     Point of contact:
     Telephone: +61 2 9409 0300                            Telephone: +61 2 9409 0300
     Facsimile: +61 2 9409 0301                            Facsimile: +61 2 9409 0301
     Email:     info@baltimore.com                         Email:     info@baltimore.com
     URL:       http://www.baltimore.com/                  URL:       http://www.baltimore.com/
32
IACS – COMMUNICATIONS


Baltimore ED8000RL                                 Cisco 3640 Router
Government Use Only




ITSEC E3 and CAPS approved                         IN EVALUATION ITSEC E2
Certificate Number: 97/92 December 1997            PROJECTED CERTIFICATION DATE: MAY 2001
CLEF: IBM Global Services                          CLEF: CMG Admiral



The ED8000RL is an Ethernet encryptor              The Cisco 3640 is a multifunction platform that
using the RAMBUTAN algorithm. It provides          combines dial access, routing, LAN-to-LAN
cryptographic protection for user data             services and multiservice integration of voice and
transmitted between LANs using Internet            data in the same device. As a modular solution,
Protocol across WANs. The encryptor is             the Cisco 3640 has the flexibility to meet both
interposed between a local Ethernet LAN subnet     current and future connectivity requirements.
and the router giving access to the WAN.           The Cisco 3640 is fully supported by Cisco
• Central management                               IOSTM software, which includes LAN-to-LAN
• Supports Ethernet V2.0 and IEEE 802.3 frame      routing, data and access security and WAN
  format incorporating SNAP                        optimization. Applications supported are
• Holds up to 16 data keys to enable creation of   asynchronous and synchronous serial interfaces.
  separate cryptographic zones
• Supports up to 512 destination IP subnet or
  device addresses
• Data rate exceeds 2Mbits per second
• SNMP TRAPs can be sent to a separate NMC




                                                   SUPPLIER:
                                                   Cisco Systems Limited
                                                   3 The Square, Stockley Park, Uxbridge, Middlesex
                                                   UB11 1BN, United Kingdom
                                                   Point of contact: Jon Arnold (For Cisco)
                                                   Telephone: +44 (0) 208 756 8651
                                                   URL:        http://j0arnold@cisco.com


                                                   SYSTEM DESIGNER:
Baltimore Technologies Ltd                         INCA
39/41 Parkgate Street, Dublin 8, Ireland           Post Point C2, North Star House,
Point of contact:                                  North Star Avenue, Swindon, Wiltshire SN2 1BS
Telephone: +61 2 9409 0300                         Point of contact: David Grant
Facsimile: +61 2 9409 0301                         Telephone: +44 (0) 1793 863173
Email:     info@baltimore.com                      Facsimile: +44 (0) 1793 863010
URL:       http://www.baltimore.com/               Email:      david.w.grant@marconi.com
                                                                                                        33
IACS – COMMUNICATIONS


     DataCryptor 2000                                   Meridian Option 1 (22.46)
     (Synchronous Line Encryptor)                       SPC Switch



     ITSEC E3                                           IN EVALUATION ITSEC E2
     Certificate Number: P126 August 1999               Projected Certification Date: 2Q 2001
     CLEF: CMG Admiral                                  CLEF: CMG Admiral



     The Datacryptor 2000 Link product range are        The Meridian Option 61C (22.46) is a state-of-
     encryption devices specifically designed to        the-art Software Stored Program Control Digital
     provide secure communications over circuits at     Switch. Utilised as a platform for integrated voice
     speeds of up to 2Mbps using a variety of line      and data, Meridian Option 61C (22.46) delivers
     interfaces. The Datacryptor 2000 prevents          sophisticated messaging, call centre and
     unauthorised information access and protects       computer telephony integration (CTI) applications
     against eavesdropping for data transmissions       for Asynchronous Transfer Mode (ATM)
     using both private and public networks. The unit   technology. These support WAN bandwidth
     provides both Tamper Evidence and Tamper           consolidation, transport and delivery of
     Resistance, and once commissioned, will operate    multimedia communications. When configured as
     automatically without further intervention.        part of a communications network the switch
     The Datacryptor 2000 series employ the Zaxus       prevents subscribers from gaining access to the
     Key Management Scheme to securely generate         management system and thus provides an
     and distribute data encryption keys. This          assured separation between subscribers and
     dispenses with the previously time-consuming       management traffic. This product is being
     and laborious tasks associated with secure key     evaluated specifically for the MOD’s Defence
     management which significantly reduces the cost    Fixed Telecommunications Service.
     of ownership.




                                                        SUPPLIER:
                                                        Nortel Networks
                                                        Maidenhead Office Park, Westacott Way,
                                                        Maidenhead, Berkshire SL1 3OH,
                                                        United Kingdom
                                                        Point of contact: Nortel
                                                        Telephone: +44 (0) 1628 432566
                                                        Facsimile: +44 (0) 1628 432657
     Zaxus Technical Sales                              URL:        http://nortelnetwork.com
     Sussex Innovation Centre, Science Park Square,
     University of Sussex, Brighton BN1 9SB,            SYSTEM DESIGNER:
     United Kingdom                                     INCA
     Point of contact: Chris Woods, Product Manager     Post Point C2, North Star House,
                      (Network Security)                North Star Avenue, Swindon, Wiltshire SN2 1BS
     Telephone: +44 (0)1273 384600                      Point of contact: David Grant
     Facsimile: +44 (0)1273 384601                      Telephone: +44 (0) 1793 863173
     Email:     chris.woods@zaxus.com                   Facsimile: +44 (0) 1793 863010
     URL:              http://zaxus.com                 Email:      david.w.grant@marconi.com
34
IACS – COMMUNICATIONS


Network Security                                  Nortel Switch Nortel
Workstation Automated                             DPN - 100/20 vG36.03
Security Management


ITSEC E3 and CAPS approved                        ITSEC E1
Certificate Number: 97/75                         Certificate Number: P142 March 2000
CLEF: Syntegra                                    CLEF: Logica



Baltimore’s RAMBUTAN Network Security             The Nortel DPN -100/20 switch running software
Workstation (NSW) offers users automated          Version G36.03 was developed by Nortel and is a
security management for the ED2048R3 and          switch within DFTS designed to form part of a
ED600RTS link encryptors or the ED8000RL LAN      packet switched data communications service.
IP encryptor. The NSW comprises a PC and a        Its purpose is to provide the interface between
cryptographic processor, the CG600R. Key          user lines and the network. It can be configured
distribution is authenticated and encrypted       either as an Access Module (AM) or a Resource
between the NSW and target encryptors.            Module (RM). The latter serves trunks, providing
A physical key has to be loaded into encryptors   dynamic routing tables, whereas the former
six monthly. All other keys are supplied to the   serves links and link/trunk interfaces. The switch
NSW by CESG. Status, alarm and audit              is a component of the DFTS PSS, which has also
information can be collected automatically or     been evaluated. The Nortel DPN - 100/20 switch
under operator control. The NSW is protected by   was evaluated against ITSEC E1 assurance
password protection mechanisms. Plain text key    requirements.
material is not accessible by an NSW operator.




                                                  SUPPLIER:
                                                  Nortel Networks
                                                  Maidenhead Office Park, Westacott Way,
                                                  Maidenhead, Berkshire SL1 3OH,
                                                  United Kingdom
                                                  Point of contact: Nortel
                                                  Telephone: +44 (0) 1628 432566
                                                  Facsimile: +44 (0) 1628 432657
                                                  URL:        http://nortelnetwork.com


                                                  SYSTEM DESIGNER:
Baltimore Technologies Ltd                        INCA
39/41 Parkgate Street, Dublin 8, Ireland          Post Point C2, North Star House,
Point of contact:                                 North Star Avenue, Swindon, Wiltshire SN2 1BS
Telephone: +61 2 9409 0300                        Point of contact: David Grant
Facsimile: +61 2 9409 0301                        Telephone: +44 (0) 1793 863173
Email:     info@baltimore.com                     Facsimile: +44 (0) 1793 863010
URL:       http://www.baltimore.com               Email:      david.w.grant@marconi.com
                                                                                                       35
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products
Directory of-infosec-assured-products

More Related Content

What's hot

ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014Symantec
 
Oracle® Trading Community Architecture
Oracle® Trading Community ArchitectureOracle® Trading Community Architecture
Oracle® Trading Community ArchitectureOracle Groups
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Serverrsnarayanan
 
Preparing and Implementing a Comprehensive ICD-10 Testing Strategy
Preparing and Implementing a Comprehensive ICD-10 Testing StrategyPreparing and Implementing a Comprehensive ICD-10 Testing Strategy
Preparing and Implementing a Comprehensive ICD-10 Testing StrategyCognizant
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardChristian Frahm
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 

What's hot (10)

ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
 
Oracle® Trading Community Architecture
Oracle® Trading Community ArchitectureOracle® Trading Community Architecture
Oracle® Trading Community Architecture
 
Cqlife L1(New 7mar11)
Cqlife L1(New 7mar11)Cqlife L1(New 7mar11)
Cqlife L1(New 7mar11)
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Server
 
Preparing and Implementing a Comprehensive ICD-10 Testing Strategy
Preparing and Implementing a Comprehensive ICD-10 Testing StrategyPreparing and Implementing a Comprehensive ICD-10 Testing Strategy
Preparing and Implementing a Comprehensive ICD-10 Testing Strategy
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
 
Pm api ref
Pm api refPm api ref
Pm api ref
 
Projekt EHR-Qtn. Ewaluacja kryteriów EuroRec Seal 2010-2011 - Marcin Zawisza
Projekt EHR-Qtn. Ewaluacja kryteriów EuroRec Seal 2010-2011 - Marcin ZawiszaProjekt EHR-Qtn. Ewaluacja kryteriów EuroRec Seal 2010-2011 - Marcin Zawisza
Projekt EHR-Qtn. Ewaluacja kryteriów EuroRec Seal 2010-2011 - Marcin Zawisza
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 

Viewers also liked

CESG - Microsoft - Luis Martins
CESG - Microsoft - Luis MartinsCESG - Microsoft - Luis Martins
CESG - Microsoft - Luis MartinsMiguel Carneiro
 
ProjectReport - Maurya,Shailesh
ProjectReport - Maurya,ShaileshProjectReport - Maurya,Shailesh
ProjectReport - Maurya,Shaileshsagar.247
 
CS587 Project - Raychaudhury,Shaalmali
CS587 Project - Raychaudhury,ShaalmaliCS587 Project - Raychaudhury,Shaalmali
CS587 Project - Raychaudhury,Shaalmalisagar.247
 
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...Principled Technologies
 
CSP586 Project - Maurya, Shailesh
CSP586 Project - Maurya, ShaileshCSP586 Project - Maurya, Shailesh
CSP586 Project - Maurya, Shaileshsagar.247
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
 
Startup de Base Tecnologica (Investigacion)
Startup de Base Tecnologica (Investigacion)Startup de Base Tecnologica (Investigacion)
Startup de Base Tecnologica (Investigacion)Luis Arraut Camargo
 
Sesion de Creative Problem Solving
Sesion de Creative Problem SolvingSesion de Creative Problem Solving
Sesion de Creative Problem SolvingLuis Arraut Camargo
 
Experiencia en emprendimiento-Unitecnologica
Experiencia en emprendimiento-UnitecnologicaExperiencia en emprendimiento-Unitecnologica
Experiencia en emprendimiento-UnitecnologicaLuis Arraut Camargo
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilitiesMayur Mehta
 

Viewers also liked (14)

Test
TestTest
Test
 
C E S G Ecotours
C E S G  EcotoursC E S G  Ecotours
C E S G Ecotours
 
CESG - Microsoft - Luis Martins
CESG - Microsoft - Luis MartinsCESG - Microsoft - Luis Martins
CESG - Microsoft - Luis Martins
 
ProjectReport - Maurya,Shailesh
ProjectReport - Maurya,ShaileshProjectReport - Maurya,Shailesh
ProjectReport - Maurya,Shailesh
 
CS587 Project - Raychaudhury,Shaalmali
CS587 Project - Raychaudhury,ShaalmaliCS587 Project - Raychaudhury,Shaalmali
CS587 Project - Raychaudhury,Shaalmali
 
Tecnologias educativas, en atención a ladiversidad
Tecnologias educativas, en atención a ladiversidadTecnologias educativas, en atención a ladiversidad
Tecnologias educativas, en atención a ladiversidad
 
Discapacidad y acceso justicia
Discapacidad y acceso justiciaDiscapacidad y acceso justicia
Discapacidad y acceso justicia
 
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...
CPU performance comparison of two cloud solutions: VMware vCloud Hybrid Servi...
 
CSP586 Project - Maurya, Shailesh
CSP586 Project - Maurya, ShaileshCSP586 Project - Maurya, Shailesh
CSP586 Project - Maurya, Shailesh
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Startup de Base Tecnologica (Investigacion)
Startup de Base Tecnologica (Investigacion)Startup de Base Tecnologica (Investigacion)
Startup de Base Tecnologica (Investigacion)
 
Sesion de Creative Problem Solving
Sesion de Creative Problem SolvingSesion de Creative Problem Solving
Sesion de Creative Problem Solving
 
Experiencia en emprendimiento-Unitecnologica
Experiencia en emprendimiento-UnitecnologicaExperiencia en emprendimiento-Unitecnologica
Experiencia en emprendimiento-Unitecnologica
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
 

Similar to Directory of-infosec-assured-products

Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyPolestar IIoT
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and productsJavier Tallón
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security CertificationsNithin Sai
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfJohn Kingsley
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical ReviewISA Interchange
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfICS
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Javier Tallón
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Jason Mashak
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemSchneider Electric
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 

Similar to Directory of-infosec-assured-products (20)

Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdf
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 

Recently uploaded

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Recently uploaded (20)

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 

Directory of-infosec-assured-products

  • 1. DIRECTORY OF INFOSEC ASSURED PRODUCTS 2001
  • 2. CONTENTS INTRODUCTION Page 3-4 IACS Introduction to CESG Infosec Assurance and Certification Services Page 5-8 CLEF Contact Details Page 9 International Certification Body Contact Details Page 9 CC and ITSEC Certified Products • Smart Cards Page 10 • PC Access Control Page 11-13 • Operating Systems Page 14-18 • Networking Page 19-24 • Firewalls Page 24-31 • Communications Page 32-37 • Databases Page 38-43 • Miscellaneous Page 43-44 PROTECTION PROFILES Introduction to Protection Profiles Page 45 List of Protection Profiles products Page 46-49 CAPS Introduction to CESG Approved Products Scheme Page 51-52 CAPS products • Data Encryption Page 53-55 • Communications Security Page 55-57 • Access Control Page 58-61 • Miscellaneous Page 62 TEMPEST Introduction to Tempest Page 63 List of Tempest approved products Page 64-66 Company names and addresses Page 67-68 INDEX Page 69-70 2
  • 3. INTRODUCTION This ‘Directory of Infosec Assured Products’ is a new publication that replaces the former UKSP-06. It has been produced as a top-level guide for both product developers, vendors and end-users, and gives details of the means by which security products are approved or certified, an overview of the products’ features, and the context in which they should be used. The Directory will be updated on an annual basis. However, as new products are regularly being approved and certified, these will be reflected on CESG’s websites, accessible via www.cesg.gov.uk, as and when they become available. The first part of the Directory contains an introduction to CESG’s Infosec Assurance and Certification Services [IACS]. IACS has been created to provide The Communications-Electronics a seamless service to customers, and Security Group [CESG] is the UK’s products listed in the sections which National Technical Authority for follow cover the various aspects of IACS. Information Security. As part of this It is recognised that, in practice, remit, CESG works closely with IT customers will require more specific developers and vendors to provide guidance. The IACS management office end users with a choice of products has therefore been created to provide whose security features have been advice and guidance to developers, objectively assessed and which vendors and end-users on the most meet clear standards of security appropriate solution to their specific assurance. assurance requirements. This is followed by a description of the mechanisms by which products are certified under ITSEC or Common Criteria, a list of certified products, and an explanation of ‘protection profiles’. Also contained in the Directory is a brief description of the new ‘Fast Track Assessment’ (FTA) service which has been designed to assess IT security products at the specific behest of customers in government. 3
  • 4. The Directory next has a section covering the CESG Assisted Products Scheme [CAPS]. This scheme ensures that government and public sector users have access to a wide range of approved products that employ cryptographic security measures. These products have undergone a thorough investigation of the security offered by the cryptography employed, whether this is through implementation of a CESG algorithm or a public domain algorithm. Finally, there is a section containing an introduction to TEMPEST services and a list of TEMPEST certified products. Inevitably, a directory such as this cannot cover all aspects of approved or certified Infosec products and related services. Customers may need more in-depth guidance and advice, and contact details are therefore provided in each of the relevant sections. For any general queries regarding CESG’s wider range of Infosec services, please contact the marketing office, details for which are given on the back page of this directory. 4
  • 5. IACS (IACS) Infosec Assurance and Certification Services The IACS approach For Developers… Technical assessors from IACS will work with developers or end users to define the best solution to their assurance requirements. By understanding the developer’s goals, IACS can define the most effective assessment package to achieve them. An assessment package could include: s Internationally recognised CC or ITSEC Certification s Cryptographic approval for HMG and the CNI (usually carried out under CAPS) s Fast Track assessment of products for HMG and the CNI s Systems assessments at all levels for IT products and systems evolve HMG and commerce rapidly and are increasingly diverse and complicated. Similarly, customer For End Users… requirements change and expand to Products which have been certified by counter new threats and to adapt us, or by our partners around the world, to new ways of working. CESG has offer end users ready-made assurance. brought together its assurance Where a Government or CNI customer services under IACS to offer has a requirement for assurance in an bespoke solutions to these uncertified product, we can perform a new security challenges. Fast Track Assessment. This allows the customer to determine whether the product is appropriate for his needs. If assurance is required in a system, then a range of packages, including IT Health Check, is available. www.cesg.gsi.gov.uk e-mail: iacs@cesg.gsi.gov.uk IACS Management Office PO Box 152 Cheltenham Gloucestershire GL52 5UF Tel. +44 (0)1242 238739 Fax: +44 (0)1242 235233 5
  • 6. Formal Evaluation and Certificate Maintenance Scheme Certification Evaluation results only apply to a The products within this section have specific version of a product, and any been certified against either Common subsequent changes (including patches, Criteria or IT Security Evaluation Criteria hot fixes and service packs) to that (ITSEC). Certificates are awarded product may invalidate those results following extensive testing of the and, therefore, the Certificate. Because product’s IT security features to ensure the evolution of products is so rapid, that those features meet an agreed the Certificate Maintenance Scheme Security Target. Results of a successful (CMS) has been devised in response. evaluation are published in a CMS provides a means of maintaining Certification Report. This contains the same level of assurance in a product additional information and advice on after certification without the need for how the certified product should be re-evaluation. used and any restrictions that may apply in its configuration or use on specific ITSEC platforms. Prospective purchasers of ITSEC is the set of criteria used for the certified products should read both the past decade by Europe and Australasia ST and the CR to ensure that the for the evaluation of products and product is suitable. STs and CRs are systems. ITSEC was a major building available from the developers and, in block in the formulation of the addition, can usually be downloaded Common Criteria. from the CESG web site. Common Criteria What is a Security Target? CC represents the outcome of international efforts to align and This is a document specifying the develop the existing European and security functionality of a product and North American criteria and has been the assurance level against which it is ratified as ISO standard 15408. The evaluated as well as a description approximate assurance correspondence relating the product to the environment between ITSEC and CC is shown below. in which it will operate. A fuller description of the testing carried out at each assurance level is contained Vulnerabilities on the web site. Certification is not a guarantee of freedom from security vulnerabilities; Common Criteria ITSEC there remains a possibility that exploitable vulnerabilities may be EAL1 – discovered after a Certificate has been EAL2 E1 awarded. Users and prospective EAL3 E2 purchasers should check regularly whether any security vulnerabilities have EAL4 E3 been discovered since certification and, EAL5 E4 if appropriate, should check with the EAL6 E5 vendor to see if any patches exist for the product. EAL7 E6 6
  • 7. International Mutual Recognition on products which have been assessed Developers whose products are certified elsewhere. Links are available from the against ITSEC or CC enjoy the benefits of CESG web site and contact details for an internationally recognised Certificate. the other recognised Certification Bodies In this brochure we detail only those appear on page 9. products which have been evaluated in HMG Departments wishing to use the UK, but end users should access the foreign certified products in other relevant national web sites to environments where national security is obtain the most up to date information an issue are advised to consult CESG. Our Certificates are currently recognised as follows: Assurance Levels Recognised Evaluation – CESG working Australia & ITSEC E1-E6 with industry New Zealand CC EAL1-4 Formal evaluation in the UK is carried Canada out by independent testing laboratories Israel CC EAL1-4 known as CLEFs which are appointed by USA the Certification Body in CESG. CLEFs meet rigorous security and ISO/IEC France 17025 quality standards. The UK has 5 Finland CLEFs, which can be contracted to carry out both evaluation and preparatory Germany consultancy work. CLEF contact details Greece are on page 9. Italy ITSEC E1-E6 CC EAL 1-7 The results of the testing of the product Netherlands are provided to the Certification Body in Norway an evaluation technical report which Spain forms the basis of the Certification Sweden Report. The CB is part of CESG and is Switzerland itself accredited by UKAS to EN45011 for its ITSEC and CC certifications. CESG recognises Certificates from other international bodies as follows: Certification/Validation Recognised Assurance Levels AISEP, Australia Common Criteria EAL1 to EAL4, ITSEC E1 to E6 BSI, Germany Common Criteria EAL1 to EAL7, ITSEC E1 to E6 CSE, Canada Common Criteria EAL1 to EAL4 DCSSI, France Common Criteria EAL1 to EAL7, ITSEC E1 to E6 NIAP, USA Common Criteria EAL1 to EAL4 7
  • 8. Fast Track Entering into evaluation Fast Track Assessment (FTA) provides a within IACS fast, flexible, cost-effective process for Developers need to contact both a CLEF the generation of a CESG endorsed and the IACS Management Office in order assessment of the extent to which to determine what sort of evaluation is security-enabled products meet the to be carried out and how much the Infosec requirements of Sponsors, in service will cost. It may be advisable to accordance with national Infosec policy. obtain some technical consultancy Sponsors would be central and local services prior to the commitment to government, and Critical National evaluation, and guidance and advice is Infrastructure (CNI) services, where it is available from the CLEFs, the IACS MO in the national interest. FTA tailors each and CESG Listed Advisor Scheme assessment to the context of the consultants. The need for evaluation intended use of the product, resulting in consultancy should be discussed with the a report that provides authoritative IACS MO and the CLEFs at the start of guidance on the product’s suitability. the product evaluation lifecycle. The FTA service provides the assurance Where cryptography is a key function of required by identified sponsors in products the security functionality offered by the whose market and limited cryptography product and the intended end users do not justify formal evaluation and include HMG clients, then this must be certification, or evaluation under CAPS. assessed by CESG. This can be done The FTA Service is intended to address under the CESG Assisted Products assurance requirements in the low to Scheme (CAPS) and as a single package medium range. with ITSEC/CC or Fast Track evaluations or assessments. The IACS Management Office is happy to System Evaluations provide more information on any of the System evaluation is highly relevant as a Assurance and Certification Services means of minimising risk and as a briefly described here. confidence hallmark for trading partners, especially as systems typically comprise a combination of certified and uncertified products. Important benefits of such evaluations are demonstrable compliance with the provisions of the Data Protection Act (1998), and supporting evidence that will enhance existing ISO17799 accreditation and assist in demonstrating compliance with BS7799 Part 2. CESG offers a number of flexible options including evaluations where only limited functionality is tested and evaluation against an assurance profile (eg E3 for firewall, E2 for authentication, E1 for audit) to meet differing requirements. For Government or CNI users there is also the option of a system IT Health Check. 8
  • 9. CLEF Contact Details Foreign Scheme Contact Details CMG Admiral (CLEF) Australia King’s Court www.dsd.gov.au/infosec 91-93 High Street The AISEP Manager Camberley Certification & Evaluation Group Surrey GU15 3RN Information Security Branch Tel. +44 (0) 1276 686678 Defence Signals Directorate Fax. +44 (0) 1276 691028 Locked Bag 5076, Kingston ACT 2604 Ralph Worswick Tel. +61 2 6265 0342 ralph.worswick@cmgplc.com Fax. +62 2 6265 0328 EDS Ltd (CLEF) Wavendon Tower Canada Wavendon www.cse.dnd.ca Milton Keynes Communications Security Establishment Bucks MK17 8LX Criteria Coordinator Tel. +44 (0) 1908 284234 IT Security Standards and Initiatives Fax. +44 (0) 1908 284393 PO Box 9703, Terminal Trevor Hutton Ottawa, Canada K1G 3Z4 trevor.hutton@edl.uk.eds.com Tel. +1 613 991 7600 Fax. +1 613 991 7411 IBM Global Services (CLEF) Meudon House Meudon Avenue France Farnborough www.scssi.gouv.fr Hants GU14 7NB Direction Centrale de la Sécurité des Tel. +44 (0) 1252 558081 Systèmes d’Information, Fax. +44 (0) 1252 558001 18, Rue du Docteur Zamenhof Bob Finlay F-92131, Issy-Les-Moulineaux bob_finlay@uk.ibm.com Cédex, France Tel. +33 141 463784 Logica UK Ltd (CLEF) Fax. +33 141 463701 Chaucer House The Office Park Springfield Drive Germany Leatherhead www.bsi.bund.de Surrey KT22 7LP Bundesamt für Sicherheit in der Tel. +44 (0) 1372 369831 Informationstechnik Fax. +44 (0) 1372 369834 Referat II 2, Godesberger Allee 183 Simon Milford 53175 Bonn, Germany MilfordS@logica.com Tel. +49 228 9583 141 Fax. +49 228 9582 455 Syntegra (CLEF) Guidion House USA Harvest Crescent www.niap.nist.gov/cc-scheme Ancells Park, Fleet National Information Assurance Hants GU13 8UZ Partnership Tel. +44 (0) 1252 778837 100 Bureau Drive (Mailstop 8930) Fax. +44 (0) 1252 811635 Gaithersburg, MD 20899-8930, USA Janet Scruby Tel. +1.301.975.2934 janet.scruby@syntegra.bt.co.uk Fax. +1.301.948.0279 9
  • 10. IACS – SMART CARDS MONDEX Purse 2.0 Multos v3 on Hitachi H8/3112 ICC ITSEC E6 ITSEC E6 Certificate Number: P129 September 1999 Certificate Number: P130 September 1999 CLEF: Logica CLEF: Logica The MONDEX Purse is an electronic purse MULTOS is a secure, multi-application operating designed to provide individuals and businesses system for use on an Integrated Circuit Card with an electronic alternative to the use of notes (ICC) (smartcard), to manage, segregate and and coins for making cash payments. Mondex execute applications written for MULTOS (such as electronic cash is stored on Integrated Circuit loyalty, ticketing, credit, debit and electronic Cards (ICCs), also known as smartcards. purse). This implementation of the MULTOS-3 MONDEX Purse Release 2.0, developed by specification, developed by platform seven and platform seven and Mondex International, has Mondex International, has been evaluated on an been evaluated when running on MULTOS Hitachi H8/3112 ICC. Applications are loaded by Version 3, (which has been separately evaluated MULTOS into the ICC’s EEPROM. During the to ITSEC E6) and the Hitachi H8/3112 ICC. production process, each ICC is injected with a unique EEPROM identifier and a unique symmetric key known only to the MULTOS Security Manager. Once loaded, MULTOS ensures that the application is segregated from any other applications present on the card. SUPPLIER: SUPPLIER: MAOSCO Ltd, 47-53 Cannon Street MAOSCO Ltd, 47-53 Cannon Street London EC4M 5SQ London EC4M 5SQ Point of contact: David Meadon Point of contact: David Meadon Telephone: +44 20 7557 5420 Telephone: +44 20 7557 5420 Facsimile: +44 20 7557 5430 Facsimile: +44 20 7557 5430 Email: customer.services@multos.com Email: customer.services@multos.com URL: http://www.multos.com URL: http://www.multos.com DEVELOPER: DEVELOPER: Platform7, 6th Floor, 1-2 Finsbury Square Platform7, 6th Floor, 1-2 Finsbury Square London EC2A 1AA London EC2A 1AA Telephone: +44 (0) 20 7714 8492 Telephone: +44 (0) 20 7714 8492 Facsimile: +44 (0) 20 7714 8246 Facsimile: +44 (0) 20 7714 8246 URL: http://www.platform7.com URL: http://www.platform7.com 10
  • 11. IACS – PC ACCESS CONTROL KILGETTY PLUS NT4 v1.0 KILGETTY PLUS v1.2h Government use only Government use only ITSEC E3 ITSEC E3 Certificate Number: P112, Issue 2 May 2000 Certificate Number: p105 November 1998 CLEF: EDS CLEF: CMG Admiral KILGETTY PLUS NT4 is a total hard disk KILGETTY PLUS is a total disk encryption encryption product, which protects government product, which protects government data against data (protectively marked up to TOP SECRET) unauthorised access in the event of loss. For use against unauthorised access in the event of loss. with IBM compatible computers running Microsoft DOS, Win 3.1 and Win 9x, all data that KILGETTY PLUS NT4 is for use with IBM is held on the computer’s hard disk is fully compatible computers running Microsoft encrypted, including data structures, operating Windows NT4, with hard disks up to 7.8GB in system and applications. Access is via a touch size. All data that is held on the computer’s hard memory device (read by a reader attached to the disk is fully encrypted, including data structures, serial port), user identity and password. operating system and applications. Access is via a touch memory device (read by a reader attached KILGETTY PLUS provides CESG approved to the serial port), user identity and password. protection for data protectively marked up to TOP SECRET and is suitable for hard disks up KILGETTY PLUS NT4 was evaluated on Microsoft to 4GB. Windows NT4 Server and Workstation versions with Service Packs 3, 4, 5, and 6a. The Software Box The Software Box Green Park Business Centre, Goose Lane Green Park Business Centre, Goose Lane Sutton on the Forest, York YO6 1ET Sutton on the Forest, York YO6 1ET United Kingdom United Kingdom Point of Contact: The Security Group Point of Contact: The Security Group Telephone: +44 (0) 1347 812100 Telephone: +44 (0) 1347 812100 Email: security_group@softbox.co.uk Email: security_group@softbox.co.uk URL: http://www.softbox.co.uk URL: http://www.softbox.co.uk 11
  • 12. IACS – PC ACCESS CONTROL Portcullis Guardian Angel Reflex Disknet for NT v 5.01D1 v1.20 ITSEC E2 ITSEC E2 Certificate Number: 98/93 January 1998 Certificate Number: P125 July 1999 CLEF: Syntegra CLEF: Logica The security mechanisms of this pre-DOS loader Reflex Disknet for Windows NT Data Security are designed to enforce PC access control for a works by creating a “shield” around every system. hierarchy of users. The security barriers are Disknet denies access to the hard disk if the imposed by: target PC is booted from a floppy and the • Authentication using passwords encrypted by system can be configured to prevent any booting an endorsed implementation of the CESG from floppy if required. It prohibits users FIREGUARD algorithm. tampering with PC configurations and prevents the introduction of unauthorised/illegal software. • User security profiles, auditing and a File PSG module prevents modification or deletion of Access Control Matrix managing access to the existing files, and prevents any changes to data. applications. PSG will also prevent any • Blocking non-authenticated programs to executable files being installed. prevent the introduction of malicious code (e.g. Viruses). • Disk certification preventing the use of floppy disks not formatted by Guardian Angel. • Encryption of data using an endorsed implementation of the CESG RED PIKE algorithm to protect files being exported or transmitted. Portcullis Computer Security Ltd Reflex Magnetics The Grange Barn, Pikes End 31-33 Priory Park Road, London NW6 7HP Pinner, Middlesex HA5 2EX United Kingdom Point of contact: Alan Romanis Point of contact: Andy Campbell Telephone: +44 (0) 208 868 0098 Telephone: +44 (0) 20 7372 6666 Facsimile: +44 (0) 208 868 0017 Facsimile: +44 (0) 20 7372 2507 Email: consult@portcullis-security.com Email: sales@reflex-magnetics.com URL: http://www.portcullis-security.com URL: http://reflex-magnetics.com 12
  • 13. IACS – PC ACCESS CONTROL SeNTry 20/20 STOPLOCK V v2.23a STOPLOCK VSC v2.23 STOPLOCK V SCenSOS v2.23a COMMON CRITERIA EAL1 ITSEC E3 Certificate Number: P100 July 1998 Certificate Number: 96/65a September 1996 CLEF: IBM Global Services CLEF: Logica SeNTry 2020 enables users to store files securely Stoplock V is a software based access control by generating an encrypted virtual drive on the package for use on IBM PCs and compatibles host PC hard disk, access to which is restricted running MS-DOS or Windows 3.x. It provides via a passphrase. The virtual drive can be tools for the controlling, monitoring and formatted to either NTFS or FAT file systems and protection of data. Stoplock V/Sc includes an all files are encrypted in real-time. At any time additional smartcard for user authentication and the user can dismount the drive or if required, user management, and Stoplock V SCenSOS set an inactivity threshold for automatic provides integration with the SCenSOS operating dismount. system for networked control and system management. The software can be installed on either a Windows NT Server or NT Workstation The evaluated functions include: (Version 4.0 SP3). The size of the virtual • Identification and Authentication; drive is limited by the OS and can utilise the following encryption algorithms: • Access Control: • MDC/SHS - enhanced boot protection • DC/RIPM - access restrictions to files and directories • Cast - rights defined by administrators only • Square • DES • Trusted Processes defined by a privileged user. • MDC/SHA1 • Accountability and Audit: • Blowfish - Audit trail of various events • Triple DES - audit trail may only be accessed by privileged • Safer users. MIS Corporate Defence Solutions MIS House, Hermitage Court Conclusive Logic Ltd Hermitage Lane, Maidstone Babbage House, 55 King Street, Kent ME16 9NT, United Kingdom Maidenhead, Berkshire SL6 1DU United Kingdom Telephone: +44 (0) 1622 723400 Point of contact: Steve Mathews Facsimile: +44 (0) 1622 728580 Telephone: +44 (0) 1628 470900 Email: uk.sales@mis-cds.com Facsimile: +44 (0) 1628 470901 URL: http://mis-cds.com URL: http://www.conclusive.com 13
  • 14. IACS – OPERATING SYSTEMS Argus B1/CMW Argus B1/CMW v1.2 for Solaris 2.4 v1.3.2 for Solaris 2.4 Argus C2/TMW Argus C2/TMW v1.2 for Solaris 2.4 v1.3.2 for Solaris 2.4 ITSEC E3 F-B1 CMW ITSEC E3 F-C2 TMW ITSEC E3 F-B1 CMW ITSEC E3 F-C2 TMW Certificate Number: Certificate Number: 96/73a (B1/CMW, x86 platform) 99/89a (B1/CMW, x86 platform) December 1996 September 1999 96/73b (C2/TMW, x86 and SPARC platforms) 99/89b (C2/TMW, x86 and SPARC platforms) December 1996 September 1999 CLEF: CMG Admiral CLEF: CMG Admiral The Argus TMW and CMW products are The Argus TMW and CMW products are workstation/server enhancements that bring an workstation/server enhancements that bring an off-the-shelf Solaris 2.4 system up to labeled-C2 off-the-shelf Solaris 2.4 system up to labeled-C2 and B1 level respectively. Each provides full and B1 level respectively. Each provides full floating information label functionality. The CMW floating information label functionality. The CMW product also provides mandatory access control product also provides mandatory access control (MAC) based on sensitivity labels. Both support (MAC) based on sensitivity labels. Both support labelled printing and a complete labelled X- labelled printing and a complete labelled X- windows subsystem for system-high (TMW) and windows subsystem for system-high (TMW) and multilevel (CMW) operations. Each can operate multilevel (CMW) operations. Each can operate in either X-window or command-line mode for in either X-window or command-line mode for desktop or server applications. The evaluation desktop or server applications. The evaluation included trusted networking, trusted path, least included trusted networking, trusted networked privilege, audit, and other functionality. access, trusted path, least privilege, superuser emulation, audit, and other functionality. Argus Systems Group, Inc. Argus Systems Group, Inc. 1809 Woodfield Drive, Savoy, IL 61874, USA 1809 Woodfield Drive, Savoy, IL 61874, USA Point of contact: Paul A. McNabb Point of contact: Paul A. McNabb Telephone: +1 217 355 6308 Telephone: +1 217 355 6308 Facsimile: +1 217 355 1433 Facsimile: +1 217 355 1433 Email: info@argus-systems.com Email: info@argus-systems.com URL: http://www.argus-systems.com URL: http://www.argus-systems.com 14
  • 15. IACS – OPERATING SYSTEMS Hewlett Packard IBM DYNIX/ptx Unix HP-UX 10.20 v4.1 SLS and 4.1a SLS on Symmetry 5000 Systems (models SE30 and SE40) ITSEC E3 /CESG ASSISTED PRODUCTS SCHEME ITSEC E3 Certificate Number: P111 February 1999 Certificate Number: 97/74 February 1997 CLEF: CMG ADMIRAL CLEF: Logica Hewlett-Packard’s HP-UX version 10.20 is an DYNIX/ptx is a secure Operating System certified X/Open UNIX 95 branded product, meaning that to E3 F-C2, and is IBM’s enhanced version of it conforms with X/Open’s Single UNIX UNIX for the Symmetry series of symmetric Specification (SPEC1170). In addition HP-UX multiprocessing systems. DYNIX/ptx conforms to 10.20 complies with such standards as X/Open all the leading industry operating systems standards, including IEEE POSIX 1003.1-1990, Portability Guide Issue IV Base Profile (XPG4), FIPS, X-Open, XPG4, Intel ABI+, OSF AES and OSF AES, IEEE POSIX 1003.1 and 1003.2, SVID USLSVID3. DYNIX/ptx includes specific support 3 level 1 APIs, as well as all major de facto APIs for operations with concurrent user populations such as BSD 4.3. in excess of 1000 and disk volumes in excess of 1000GB. The hardware may be extended by HP-UX 10.20 is designed to exceed the ITSEC F- adding more processors with true linear C2 functionality class, with the following notable performance scalability. extensions: • Terminal-based User Authentication Three additional CESG modules are available for • Time-based User Authentication use in HMG systems and may be applied for, • Boot Authentication namely FIRESTONE, THUNDERBOLT and • Access Control Lists THUNDERFLASH password encryption and generation packages. • ‘Green Book’ compliant Password Management - generation & encryption HP-UX 10.20 is supported across the full range of HP9000 Workstations and Servers Hewlett-Packard Ltd Nine Mile Ride, Wokingham, Berkshire RG40 3LL, United Kingdom Point of contact: Christopher Simpson Point of contact: Valerie Ashton Telephone: 01344-365029 Telephone: +44 (0) 1932 851111 Facsimile: 01344-763747 Facsimile: +44 (0) 1932 850011 Email: christopher_simpson@hp.com Email: val_ashton@uk.ibm.com URL: http://www.hp.com/uk URL: 15
  • 16. IACS – OPERATING SYSTEMS IBM DYNIX/ptx Microsoft Windows NT v4.4.2 running on Symmetry 5000 Workstations and Win NT systems and NUMA-Q 2000 Server 4.0 ITSEC E3 ITSEC E3 Certificate Number: P108V2 January 2000 Certificate Number: P121 March 1999 CLEF: Logica CLEF: Logica DYNIX/ptx Version 4.4.2 (with CESG algorithms) Windows NT is a multi-tasking operating system is IBM’s enhanced version of UNIX running on for controlling and managing networks of Symmetry 5000 systems (Model SE40) and computers and electronic resources in a NUMA-Q (Non Uniform Memory Access) 2000 distributed multi-user environment. Trusted log (with EMC≈ Symmetrix 3430/3700 disk arrays) on for user authentication, DAC of electronic and is evaluated to E3 F-C2. resources, accounting and audit of user activities, and controlling system policies and user profiles DYNIX/ptx is a robust and reliable in arbitrary network configurations, including implementation of UNIX for secure commercial interconnection of trusted domains, have been projects running enterprise level applications. evaluated. The evaluated Windows NT 4.0 SP3 DYNIX/ptx conforms to all the leading industry security enforcing functions specified in its operating systems standards, including IEEE Security Target provide the essential basis on POSIX 1003.1-1990, FIPS, X-Open, XPG4, Intel which other specialised security enforcing ABI+, OSF AES and USLSVID3. functions of evaluatable systems such as messaging, firewall, virtual private network, and Four optional CESG modules will be available for PKI related systems could depend. Microsoft are use in HMG systems, namely FIREGUARD, participating in the development of Common FIRESTONE, THUNDERBOLT and Criteria Protection Profiles of such systems. THUNDERFLASH password encryption and generation packages. Microsoft Ltd Microsoft Campus, Thames Valley Park, Reading, Berks RG1 1WG, United Kingdom Point of contact: Valerie Ashton Point of contact: Peter Birch Telephone: +44 (0) 1932 851111 Telephone: +44 (0) 870 6010 100 Facsimile: +44 (0) 1932 850011 Facsimile: +44 (0) 870 6020 100 Email: val_ashton@uk.ibm.com Email: peterbir@microsoft.com URL: URL: http://www.microsoft.com/uk 16
  • 17. IACS – OPERATING SYSTEMS Sun Solaris 2.6 Sun Solaris Certificate Maintenance Scheme v8 with AdminSuite v 3.0.1 ITSEC E3 COMMON CRITERIA EAL4 Certificate Number: P101 January 1999 Certificate Number: P148 November 2000 CLEF: Logica CLEF: Logica Solaris 2.6 is the latest version of Sun’s Solaris 8 is a UNIX-based operating system which commercial Solaris operating system evaluated to can be configured from a number of ITSEC E3/F-C2. The product was initially workstations and servers to form a single evaluated on the Sun UltraSPARC-1 Workstation distributed system. AdminSuite 3.0.1 provides and servers sharing information in a distributed tools to configure security aspects of Solaris 8. networking environment. The evaluation includes Both Solaris 8 and AdminSuite 3.0.1 have been the following features in addition to the ITSEC developed by Sun Microsystems Inc. Solaris 8, Functionality Class F-C2: with AdminSuite 3.0.1, has been certified as • CDE window system meeting the Common Criteria Part 3 conformant • Networking utilising the TCP/IP protocol requirements of EAL4 for the specified Common • NIS+ Distributed Naming Service Criteria Part 2 extended functionality in the • NFS specified environment when running on the specified Sun SPARC and Intel Pentium In February 1999, Sun entered into the platforms. It has also met the requirements of Certificate Maintenance Scheme and the Controlled Access Protection Profile. evaluation is extended to a wide range of Sun platforms, from uni-processor MicroSPARC workstations to multi-processor UltraSPARC Enterprise servers. Sun Microsystems Inc Sun Microsystems Inc MPK 18-211 rm 2295, 901 San Antonio Road, MPK 18-211 rm 2295, 901 San Antonio Road, Palo Alto, CA 94303, USA Palo Alto, CA 94303, USA Point of contact : Point of contact : Telephone: Telephone: Facsimile: +1 650 786 5731 Facsimile: +1 650 786 5731 Email: Solaris-Security-Target@Eng.Sun.Com Email: Solaris-Security-Target@Eng.Sun.Com URL: http://www.sun.com/security URL: http://www.sun.com/security 17
  • 18. IACS – OPERATING SYSTEMS Trusted Solaris 2.5.1 Certificate Maintenance Scheme ITSEC E3 Certificate Number: P104 September 1998 CLEF: Logica Trusted Solaris 2.5.1 is a highly configurable trusted operating system based on Sun’s Solaris 2.5.1 commercial UNIX operating system. It is designed to meet the specific security needs of customer seeking evaluated security systems. Trusted Solaris supports ITSEC E3/F-B1 and ITSEC E3/F-C2 with the following major features, all of which were included in the evaluation: • MAC, DAC and information labels; • Least privilege; • Full identification and authentication facilities, including password generation; • Separate trusted administration and security roles; • Graphical User Interface administration tools; • Centralised Trusted Facilities Management; • NIS+ Naming service; • Secure CDE Windowing environment with support for X11R5 and Motif; • Trusted Networking using TCP/IP and TSIX or MASIX protocols; • Trusted NFS; • Auditing; • Multi-level mail. Sun Microsystems Inc MPK 18-211 rm 2295, 901 San Antonio Road, Palo Alto, CA 94303, USA Point of contact: Telephone: Facsimile: +1 650 786 5731 Email: Solaris-Security-Target@Eng.Sun.Com URL: http://www.sun.com/security 18
  • 19. IACS – NETWORKING Authoriszor Secure Extranet Entrust/Admin & Access Management System Entrust/Authority from Entrust/PKI 4.0a IN EVALUATION COMMON CRITERIA EAL4 COMMON CRITERIA EAL3 Projected Certification Date: July 2001 Certificate Number: P122 March 1999 CLEF: IBM Global Services CLEF: Syntegra Authoriszor been developed to provide a secure Entrust/Authority is the core component of an HTTP page delivery system which publishes Entrust public-key infrastructure. Acting as the WWW pages via Microsoft Internet Information Certification Authority (CA), Entrust/Authority Server. Content is protected from attack by issues X.509 public-key certificates and performs storing it in a location that is inaccessible from key and certificate management functions. the Internet whilst webroot is constantly Other Entrust/Authority capabilities include the monitored to protect against file deposition or ability to cross-certify with other CAs, the use of modification attacks. flexible certificates (for including X.509v3 certificate extensions), and the use of flexible The optional client support allows web content user password rules. to be delivered, on demand, in strict accordance with a client’s pre-defined security profile. Entrust/Admin is an administrative interface to Entrust/Authority and allows operators to It provides a Management System that will allow: manage users, set the security policy, and control • Multiple site support; the PKI. All messages between Entrust/Admin • Positive Identification of clients; and Entrust/Authority are secured for • Definition of security profiles for clients confidentiality, integrity, and authentication. and content; • Activity logging. Authoriszor Ltd Entrust Technologies Ltd. Windsor House, Cornwall Rd 1000 Innovation Drive, Ottawa, Ontario, Canada, Harrogate HG1 2PN, United Kingdom K2K 3E7 Point of contact: Richard Atkinson Point of contact: Darryl Stal Telephone: +44 (0) 1423 730300 Telephone: (613) 270-3483 Facsimile: +44 (0) 1423 730315 Facsimile: (613) 270-2503 Email: richard.atkinson@authoriszor.com E-mail: entrust@entrust.com URL: http://www.authoriszor.com URL: http://www.entrust.com 19
  • 20. IACS – NETWORKING Entrust/RA from Entrust/PKI Entrust/RA from Entrust/PKI 5.0 5.1 COMMON CRITERIA EAL3 COMMON CRITERIA EAL3 Certificate Number: P141 March 2000 Certificate Number: P153 February 2001 CLEF: Syntegra CLEF: Syntegra Entrust/RA 5.0 is an administrative interface to Entrust/RA 5.1 is an administrative interface to Entrust/Authority and allows operators to Entrust/Authority and allows operators to manage users, set the security policy, and control manage users, set the security policy, and control the PKI. Security Officers and Administrators the PKI. Security Officers and Administrators connecting to Entrust/Authority authenticate connecting to Entrust/Authority authenticate themselves using digital signatures. themselves using digital signatures. Once complete, all messages between Once complete, all messages between Entrust/RA and Entrust/Authority are then Entrust/RA and Entrust/Authority are then secured for confidentiality, integrity, and secured for confidentiality, integrity, and authentication. Cryptographic operations for authentication. Cryptographic operations for Entrust/RA are performed in the FIPS 140-1 Entrust/RA are performed in the FIPS 140-1 Level 2 validated Entrust cryptographic module. Level 2 validated Entrust cryptographic module. Entrust/RA is currently certified on Microsoft Entrust/RA is being evaluated on Microsoft Windows NT 4.0 Service Pack 3. Windows NT 4.0 Service Pack 6a. Entrust Technologies Ltd. Entrust Technologies Ltd. 1000 Innovation Drive, Ottawa, Ontario, Canada, 1000 Innovation Drive, Ottawa, Ontario, Canada, K2K 3E7 K2K 3E7 Point of contact: Darryl Stal Point of contact: Darryl Stal Telephone: (613) 270-3483 Telephone: (613) 270-3483 Facsimile: (613) 270-2503 Facsimile: (613) 270-2503 E-mail: entrust@entrust.com E-mail: entrust@entrust.com URL: http://www.entrust.com URL: http://www.entrust.com 20
  • 21. IACS – NETWORKING Entrust/Authority from Entrust/Authority from Entrust/PKI 5.0 Entrust/PKI 5.1 COMMON CRITERIA EAL3 COMMON CRITERIA EAL3 Certificate Number: P141 March 2000 Certificate Number: P153 February 2001 CLEF: Syntegra CLEF: Syntegra Entrust/Authority 5.0 is the core component of Entrust/Authority 5.1 is the core component of an Entrust public-key infrastructure. Acting as an Entrust public-key infrastructure. Acting as the Certification Authority (CA), Entrust/Authority the Certification Authority (CA), Entrust/Authority issues X.509 public-key certificates and performs issues X.509 public-key certificates and performs key and certificate management functions. key and certificate management functions. Other Entrust/Authority capabilities include the Other Entrust/Authority capabilities include the ability to cross-certify with other CAs, the use of ability to cross-certify with other CAs, the use of flexible certificates (for including X.509v3 flexible certificates (for including X.509v3 certificate extensions), the use of flexible user certificate extensions), the use of flexible user password rules, the ability to specify either RSA password rules, the ability to specify either RSA (1024 or 2048) or DSA 1024 as the CA signing (1024 or 2048) or DSA 1024 as the CA signing algorithm and CA signing key size, and the ability algorithm and CA signing key size, and the ability to renew the CA signing key pair before it expires to renew the CA signing key pair before it expires and to recover from possible CA key and to recover from possible CA key compromise. compromise. Entrust Technologies Ltd. Entrust Technologies Ltd. 1000 Innovation Drive, Ottawa, Ontario, Canada, 1000 Innovation Drive, Ottawa, Ontario, Canada, K2K 3E7 K2K 3E7 Point of contact: Darryl Stal Point of contact: Darryl Stal Telephone: (613) 270-3483 Telephone: (613) 270-3483 Facsimile: (613) 270-2503 Facsimile: (613) 270-2503 E-mail: entrust@entrust.com E-mail: entrust@entrust.com URL: http://www.entrust.com URL: http://www.entrust.com 21
  • 22. IACS – NETWORKING Remote Management Centre Luna® CA3 Token ITSEC E1 IN EVALUATION COMMON CRITERIA EAL4 Certificate Number: S115 January 2001 Projected Certification Date: 1 July 2001 CLEF: CMG Admiral CLEF: SYNTEGRA IBM Remote Management Centre provides a The Luna® CA3 Token, Luna® Dock Card Reader, focal point for Remote Network Management, and Luna® PIN Entry Device combine to provide Remote Systems Management and Remote a robust hardware security module for Environmental Monitoring. The security of the Certification Authorities, Certification Service unit allows multiple customers to be managed Providers and Validation Authorities within Public from a central location whilst maintaining the Key Infrastructures. The product provides secure integrity of the individual networks and mission generation, storage, access control and backup critical systems. The service allows RMC staff to of the private signing key of the Authority. integrate with customers’ networks in a secure It provides advanced security features such as manner using a combination of authentication, trusted path for entry of authentication data, auditing and accounting incorporated into the M of N activation for multi-person control of secure LAN. Several technologies are employed, critical operations and Luna® Key Cloning for including firewalls, controlled access lists, user secure backup of private keys and other authentication and monitoring. The individual sensitive data. customers monitoring stations integrate into this secure environment allowing display of individual alarms on a centralised videowall. Chrysalis-ITS IBM One Chrysalis Way, Ottawa, ON Weybridge Business Park, Addlestone Road, K2G 6P9, Canada Weybridge, Surrey, KT15 2UF, United Kingdom Point of contact: Terry Fletcher, VP Trusted Systems Engineering Point of contact: David Stacey Telephone: 613 723-5076 Telephone: +44 (0) 1932 851111 Facsimile: 6I3 723 5078 Facsimile: +44 (0) 1932 814333 Email: sales@chrysalis-its.com Email: davidstacey@uk.ibm.com tfletcher@chrysalis-its.com URL: http://www.uk.ibm.com URL: http://www.chrysalis-its.com 22
  • 23. IACS – NETWORKING SureWare KeyPer v1.0 SureWare Net ED20M ITSEC E3 IN EVALUATION ITSEC E3 and CAPS Certificate Number: P154 March 2001 Projected Certification Date: December 2001 CLEF: IBM Global Services CLEF: IBM Global Services SureWare Keyper is a hardware cryptographic The SureWare Net ED20M is an Ethernet VPN module that guarantees the safety and integrity of encryptor that allows users to communicate key material. SureWare Keyper has been awarded protectively marked material across untrusted FIPS 140-1 level 4. It connects to a host networks by using cryptographic mechanisms to computer via standard networking technology in lower the marking of the actual network traffic. order to provide secure cryptographic services to host computer applications: Features: • Key Generation • Transfer of encrypted user data IP datagrams • Encryption between pairs of encryptors • Message Authentication Code • Configurable security policy for authorising IP • Signing addresses and protocols • Automated key management These applications will communicate with • Audit trail of events SureWare Keyper via the industry standard • Local and remote management options interface PKCS#11. • Security enforcing remote management communications protected cryptographically The scope of the evaluation covered those • Authenticated local management mechanisms that protect the cryptographic • Operational and standby modes services that the TOE provides. Triple DES and • Tamper resistant crypto-kernel SHA-1 contained within the TOE are publicly • Operation with Ethernet V2.0 and IEEE 802.3 known. Other cryptographic services provided with SNAP headers such as RSA and Diffie Hellman, were outside the scope of the evaluation. Baltimore Technologies Ltd Baltimore Technologies Ltd 39/41 Parkgate Street, Dublin 8, Ireland 39/41 Parkgate Street, Dublin 8, Ireland Point of contact: Point of contact: Telephone: +61 2 9409 0300 Telephone: +61 2 9409 0300 Facsimile: +61 2 9409 0301 Facsimile: +61 2 9409 0301 Email: info@baltimore.com Email: info@baltimore.com URL: http://www.baltimore.com URL: http://www.baltimore.com 23
  • 24. IACS – NETWORKING IACS – FIREWALLS Tracker 2650 Data Collection BorderWare Firewall Server Unit v6.1.2 ITSEC E2 COMMON CRITERIA EAL4 Certificate Number: P133 March 2000 Certificate Number: P136 January 2000 CLEF: Logica CLEF: Syntegra Tracker is an intelligent modem that reliably logs The BorderWare Firewall server’s EAL4 data in 32 Megabytes of battery backed memory certification covers the integrated operating until polled. It receives data on four RS232 system and a completed set of the facilities ports that can also be used for transparent two- needed to operate a secure and effective Internet way communication with the data source. It will connection. The Firewall’s operating system dial out when it detects alarm conditions. (S-CORE) is hardened to protect against known vulnerabilities and to provide a secure platform When used in a network management system, for the extensive set of application proxies that Tracker prevents subscribers on a switch from control information flow through the Firewall. gaining access to the remote management The proxies are complimented with application system and provides assured separation between server for E-mail, FTP, WWW and dual DNS. subscribers and management traffic. It also The integrated Mail server can be configured to protects the switch from unauthorised access provide a complete e-mail system or operate as a when replacing diagnostic modems. relay delivering mail to protected internal servers. This product was evaluated for the MOD’s Defence Fixed Telecommunications Service. Data Track Technology plc 153 Somerford Road Christchurch Dorset BH23 3TY United Kingdom BorderWare Technologies Inc 1 The Harlequin Centre, Southall Lane, Point of contact: Mike Terry, Business Southall, Middlesex UB2 5NH, United Kingdom Development Manager Point of contact: Telephone: +44 (0) 1425 282022 Telephone: +44 (0) 20 8893 6066 Facsimile: +44 (0) 1425 271978 Facsimile: +44 (0) 20 8574 8384 Email: mterry@dtrack.com Email: info@borderware.com URL: http://dtrack.com URL: http://www.borderware.com 24
  • 25. IACS – FIREWALLS BorderWare Firewall Server Check Point Firewall-1 v6.5 v4.0 Stateful Inspection IN EVALUATION COMMON CRITERIA EAL4 ITSEC E3 PROJECTED CERTIFICATION DATE: 3Q 2001 Certificate Number: P107 March 1999 CLEF: Syntegra CLEF: CMG Admiral The BorderWare Firewall includes an integrated This evaluation addresses the core elements of operating system and a completed set of services Firewall-1 i.e. the Stateful Inspection engine, needed to operate a secure and effective Internet auditing, address translation and the command- connection. The Firewall’s operating system line user interface for Microsoft NT Version 4.0 (S-CORE) is hardened to protect against known SP 3, Solaris 2.6, AIX version 4.2.1 and HP-UX vulnerabilities and to provide a secure platform Version 10.10. for the extensive set of application proxies that control information flow through the Firewall. The Firewall-1 product suite delivers an The proxies are complimented with application integrated solution that scales to meet the server for E-mail, FTP, WWW and dual DNS. demands of organizations large and small, The integrated Mail server can be configured to securing your enterprise network – LAN, Internet, provide a complete e-mail system or operate as a intranet and extranets. relay delivering mail to protected internal servers. V6.5 of the Firewall server will be available both Based on Stateful Inspection technology, a packaged on dedicated hardware and as a security technology invented and patented by complete software package for easy installation Check Point Software Technologies, FireWall-1 on standard hardware. provides security at the highest level currently available. Stateful Inspection incorporates communication, application state and context information, which is stored and updated dynamically. BorderWare Technologies Inc Check Point Software Technologies Ltd 1 The Harlequin Centre, Southall Lane, 3A Jabotinsky St., Diamond Tower, Southall, Middlesex UB2 5NH, United Kingdom Ramat-Gan 52520, Israel Point of contact: Point of contact: Nigel Mould Telephone: +44 (0) 20 8893 6066 Telephone: +44 (0) 1223 713611 Facsimile: +44 (0) 20 8574 8384 Facsimile: +44 (0) 1223 713621 Email: info@borderware.com Email: nigelm@checkpoint.com URL: http://www.borderware.com URL: http://www.checkpoint.com 25
  • 26. IACS – FIREWALLS Check Point VPN-1/Firewall-1 Cisco Secure PIX Firewall v4.1 SP2 Software Version 5.2(3) Hardware Models 515, 520 & 525 ITSEC E3 COMMON CRITERIA EAL4 Certificate Number: P149 January 2001 Certificate Number: P152 January 2001 CLEF: CMG Admiral CLEF: Syntegra This evaluation addresses the core elements of The Cisco Secure PIX Firewall is a dedicated Firewall-1, but also includes the Graphical User firewall appliance from Cisco Systems. The family Interface, Remote Management, Authentication, of firewalls delivers strong security without Encryption and LDAP interface for FireWall-1 impacting network performance. The product Version 4.1 running on Microsoft NT Version 4.0 line scales to meet a range of customer SP 5, Solaris 2.6 and AIX Version 4.3. requirements, and has only two license levels - one restricted licence and an unlimited licence. VPN-1/FireWall-1 is the most comprehensive security suite available today. Providing an The PIX Firewall is an integrated unit and does integrated solution that scales to meet the not have an underlying operating system such as demands of organizations large and small, NT or UNIX, and this increases security and securing your enterprise network – LAN, Internet, performance. The PIX 525 is able to support over intranet and extranets. 340Mbps of throughput and over 250,000 concurrent sessions. VPN-1/Firewall-1 is the center of an extensive policy management framework. The intuitive GUI is used to write the enterprise security policy, which is then applied to all remote or internal gateways. Check Point Software Technologies Ltd Cisco Systems 3A Jabotinsky St., Diamond Tower, 3, The Square, Stockley Park, Ramat-Gan 52520, Israel UXBRIDGE, Middlesex UB11 1BN Point of contact: Nigel Mould Point of contact: Paul King Telephone: +44 (0) 1223 713611 Telephone: +44 (0) 20 8756 8349 Facsimile: +44 (0) 1223 713621 Facsimile: +44 (0) 20 8576 8099 Email: nigelm@checkpoint.com Email: securitysolutions@cisco.com URL: http://www.checkpoint.com URL: http://www.cisco.com/uk/securitysolutions 26
  • 27. IACS – FIREWALLS CyberGuard Firewall for CyberGuard Firewall for Windows NT UnixWare 4.1 Certificate Maintenance Scheme (also available as CyberGuard Firewall Appliances) Certificate Maintenance Scheme The latest CMS Approved version of CyberGuard The latest CMS Approved version of Firewall for Windows NT is 4.2 PSU1. All CyberGuard Firewall for UnixWare 4.1 is 4.2 intermediate releases and updates are also CMS PSU1. All intermediate releases and updates approved. are also CMS approved. ITSEC E3 ITSEC E3 Certificate Number: P118 January 1999 Certificate Number: P117 January 1999 CLEF: Logica CLEF: Logica CyberGuard Firewall for Windows NT is closely CyberGuard® Firewall for UnixWare® is provided linked to Microsoft Windows NT® to maximise with a MLS UNIX operating system. It safeguards performance, accuracy and security of the information held on internal networks, by network. The evaluated firewall is a multi-homed controlling the access of external users and configuration providing both IP packet filtering protecting the integrity, availability, authentication and application-level proxies. A Graphical User data and anonymity of the internal network. Interface (GUI) for configuration and reporting Configuration and Reporting is performed with a and up to 16 multiple network interfaces are local Graphical User Interface (GUI). Additional available. To ease installation and management, network interfaces (up to 32) provide DMZ or the firewall interacts with and exploits existing further internal/ external network connections. NT domain controllers to obtain user and The firewall runs on either single or multi- authentication information. The Windows NT processor Intel servers with UnixWare 2.1.3. environment is secured with SecureGuard™for CyberGuard Firewall for UnixWare is available NT, providing protection against security threats from Release 4.2 onwards as a pre-staged such as uncontrolled access to system resources. appliance known as FireSTAR, KnightStar and Available for systems with a minimum of STARLord Premium Appliance Firewalls. 133MHz Intel Pentium Processor, 32MB Memory These variants are therefore CMS Approved. running Windows NT rev 4.0 with Service Pack 3 or 4. CyberGuard Europe Ltd CyberGuard Europe Ltd Asmec Centre, Eagle House, The Ring, Asmec Centre, Eagle House, The Ring, Bracknell, Berkshire RG12 1HB Bracknell, Berkshire RG12 1HB Point of contact: Andrew Clarke Point of contact: Andrew Clarke Telephone: + 44 (0)1344 382550 Telephone: + 44 (0)1344 382550 Facsimile: + 44 (0)1344 382551 Facsimile: + 44 (0)1344 382551 Email: aclarke@cyberguard.com Email: aclarke@cyberguard.com URL: http://www.cyberguard.co.uk URL: http://www.cyberguard.co.uk 27
  • 28. IACS – FIREWALLS CyberGuard Firewall v2 CyberGuard Firewall for Certificate Maintenance Scheme UnixWare/Premium CyberGuard Firewall 2.2.1e has CMS Appliance Firewall 4.3 approved versions up to CyberGuard Firewall 2.2.3r9. ITSEC E3 COMMON CRITERIA EAL4 Certificate Number: 97/78 March 1997 Certificate Number: P150 December 2000 CLEF: Logica CLEF: Logica CyberGuard Firewall Version 2 is an appliance CyberGuard Firewall is a packet filter, (stateful firewall that controls and monitors user access to inspection) and application level proxy firewall local- and wide-area networks by leveraging the provided with a MLS (secure) Unix operating advantages of a multi-level secure architecture. system. It safeguards internal networks by CyberGuard Firewall runs on B1 secure operating controlling external access and protects the system and networking products. CyberGuard is integrity, availability, authentication data and designed to reduce the area of risk to a single anonymity of the internal network. system; it operates as a packet-filtering gateway, Configuration/reporting is performed via local a proxy gateway and a Bastion Host in a multi- GUI. Additional interfaces (up to 32) provide system environment. For example, when located DMZ or further internal/external connections. between an internal network, an Intranet and/or Evaluated security features include: Connection the internet, it provides valuable protection of a level Access Control for IP packets; Accounting, company’s computing resources and data. auditing and statistics; Alerts for security events; CyberGuard Firewall has been evaluated on both Network Address Translation and Split Domain the NH4000 and NH5000 platforms, in either Name Server (DNS). The firewall runs on single tower or rack-mounted packaging. or multi-processor Intel IA-32 processors and as a packaged solution – the CyberGuard Premium Appliance family: FireSTAR, KnightSTAR and STARLord. CyberGuard Europe Ltd CyberGuard Europe Ltd Asmec Centre, Eagle House, The Ring, Asmec Centre, Eagle House, The Ring, Bracknell, Berkshire RG12 1HB Bracknell, Berkshire RG12 1HB Point of contact: Andrew Clarke Point of contact: Andrew Clarke Telephone: + 44 (0)1344 382550 Telephone: + 44 (0)1344 382550 Facsimile: + 44 (0)1344 382551 Facsimile: + 44 (0)1344 382551 Email: aclarke@cyberguard.com Email: aclarke@cyberguard.com URL: http://www.cyberguard.co.uk URL: http://www.cyberguard.co.uk 28
  • 29. IACS – FIREWALLS Gauntlet Internet Firewall MailGuard Bastion 1.0 for Windows NT v3.01 ITSEC E3 ITSEC E3 Certificate Number: P127 June 1999 Certificate Number: P144 May 2000 CLEF: EDS CLEF: Admiral The Gauntlet Internet Firewall for Windows NT is MailGuard Bastion is a high assurance messaging a native development for Windows NT 4.0. firewall that allows the exchange of X.400 and The Gauntlet Internet Firewall for Windows NT SMTP/MIME messages between networks of combines an application gateway with user differing security levels or conflicting security transparency and ease of management. Security policies. functions evaluated include: • Prevention of internal IP addess spoofing; MailGuard Bastion is evaluated and assured to • System integrity checking; ITSEC E3, making it ideally suited to meet the • Comprehensive auditing and accounting most stringent security policies. The product functions; builds upon the Trusted Solaris operating system, • Alarms raised to the Administrator on defined which itself is ITSEC E3/F-B1 and E3/F-C2 events; approved. MailGuard Bastion can be supplied as • Packet level filtering; a software package or as a turnkey system • SMTP, telnet, rlogin, HTTP, ftp, SQL*net, pop3 (comprising hardware and software) configured and PLUG proxies; and working to requirements. • Strong user Authentication with the ability to insert user definable mechanisms; • Configurable option to prevent JAVA applets, JAVA scripts and ActiveX; • URL filtration mechanisms; • Content Vectoring Protocol support. NET-TEL Computer Systems Ltd Network Associates – UK 4 Place Farm, Wheathampstead 227 Bath Road, Slough, Berkshire SL1 5PP Herts AL4 8SB, United Kingdom Point of contact: Evan Garricks Point of contact: Nick Ward Telephone: +44 (0) 1753 217 500 Telephone: +44 1582 830500 Facsimile: +44 (0) 1753 217 520 Facsimile: +44 1582 830501 Email: evan_garricks@nai.com Email: Nick.Ward@net-tel.co.uk URL: http://www.nai.com URL: http://mailguard.co.uk 29
  • 30. IACS – FIREWALLS Safegate v2.0.2 SWIPSY Firewall Toolkit COMMON CRITERIA EAL3 ITSEC E3 Certificate Number: P139 January 2000 Certificate Number: P147 August 2000 CLEF: Logica CLEF: EDS Safegate (Version 2.0.2) firewall has the The SWIPSY (Switch IP SecurelY) firewall toolkit following functions: provides an extensible framework for • IP packet filtering; constructing assured Bastion Host firewalls. • application gateway (non-transparent and transparent); SWIPSY is based on a stripped down • security management (containing the audit configuration of Sun’s Trusted Solaris (TSol) 2.5.1 functions); operating system. By relying on the mandatory access controls of TSol, SWIPSY provides strong IP packet filtering permits or denies the separation between networks. Controlled transmission of IP packets through Safegate from communication between networks can be the hostile network and the private network configured, using either a filestore or a TCP/UDP according to filtering rules defined by an interface. authorised administrator. The transparent gateway (TCP, UDP, ICMP, FTP, Telnet and various Third party proxies such as Squid or Message multimedia services) allows a direct connection Transfer Agents may be integrated, without the between a client on the private network and a need for re-evaluation, to achieve an E3 firewall, host on the Internet. The non-transparent although formal evaluation of the software may gateway (only FTP and Telnet services) allows be necessary if certain TSol privileges are needed. simultaneous sessions between the client on the private network and the Internet host. Central Enquiry Desk Defence Evaluation and Research Agency, Fujitsu Ltd Ively Road, Farnborough, Hampshire GU14 0LX, 1405, Ohmaru, Inagi-shi, United Kingdom Tokyo 206-8503, Japan Point of contact: Sharon Lewis Point of contact: Takehiko Yahagi Telephone: +44 1684 896535 Telephone: +81 44 370 7637 Facsimile: +44 1684 896660 Facsimile: +81 44 370 7737 Email: S.Lewis@eris.dera.gov.uk Email: t-yahagi@jp.fujitsu.com URL: http://www.dera.gov.uk/html/it/secure-e- URL: http://www.fujitsu.co.jp/en/ business/network_boundary_service.htm 30
  • 31. IACS – FIREWALLS Symantec Enterprise Firewall VCS Firewall v3.0 v6.5 IN EVALUATION COMMON CRITERIA EAL4 COMMON CRITERIA EAL1 Projected Certification Date: July 2001 Certificate Number: P123 March 1999 CLEF: Syntegra CLEF: IBM Global Services Symantec Enterprise Firewall provides complete The VCS Firewall manages data and perimeter protection by integrating application communications between trusted and untrusted proxies, network circuits and packet filtering into networks. It supports four independent networks its hybrid architecture. Its intuitive management and can manage simultaneously traffic between and high-performance characteristics work all pairs of networks. The VCS Firewall is proxy- together comprising the most secure, based. Proxies for HTTP, Telnet, FTP and Mail manageable, flexible firewall for enterprise Exchange, as well as a Generic proxy for all other protection. Integrated components, such as proxiable protocols, are included. Packet filtering application proxy architecture and a multi-firewall of TCP, UDP and ICMP is also supplied. management GUI enable the Symantec Enterprise All configuration of the VCS Firewall is by way of Firewall to address the broad perimeter security a Graphical User Interface. This makes the VCS needs of companies connecting to the Internet. Firewall easy to configure, as well as providing Some of the features unique to the Symantec sanity checking on the configuration. Enterprise Firewall include: (1) initial & continuous system hardening, (2) DDoS attack protection, (3) support for authenticating sessions, (4) consolidated, non-order-dependent rule setting, and (5) generic and port-range service proxies supporting legacy, proprietary or emerging protocols. The Knowledge Group SYMANTEC Corporation Knowledge House, Concorde Road, 266 Second Avenue, Waltham, Patchway, Bristol BS34 5TB, United Kingdom Massachusetts 02451 Point of contact: Regina Hammond Point of contact: Alan Jones Telephone: +1 781-530-2305 Telephone: +44 (0) 117 900 7500 Facsimile: +1 781-487-6755 Facsimile: +44 (0) 117 900 7501 Email: rhammond@symantec.com Email: URL: http://www.symantec.com URL: http://www.ktgroup.co.uk 31
  • 32. IACS – COMMUNICATIONS Baltimore ED2048R3 Baltimore ED600RTS Government Use Only ITSEC E3 and CAPS approved ITSEC E3 and CAPS approved Certificate Number: 96/60 April 1996 Certificate Number: 95/55 September 1995 CLEF: IBM Global Services CLEF: Syntegra The ED2048R3 provides cryptographic The ED600RTS is a RAMBUTAN Encryptor for protection for up to 2.048 Mbps point-to-point synchronous data transmitted on a point-to-point links. The ED2048R3 has 2 interface options: link, at speeds of up to 128 Kbps using an X.21 • X21 interface. The ED2048R3 offers a two-tier key • G.703/G.732/G704 hierarchy. Four data encryption keys (DEKs) can The X.21 interface is suited to protecting flexible be entered into the master encryptor from a bandwidth services as line speeds swipe card and downloaded over the link to slave can be increased without reconfiguration. units. Alternatively, the ED2048R3 can be The G704 interfaces support an nx64 Kbps managed from the Baltimore Network Security fractional service. Workstation, to provide automated key and equipment management The ED2048R3 offers a two-tier key hierarchy. Four data encryption keys (DEKs) can be entered into the master encryptor from a swipe card and downloaded over the link to slave units. Alternatively, the ED2048R3 can be managed from the Baltimore Network Security Workstation, to provide automated key and equipment management. Baltimore Technologies Ltd Baltimore Technologies Ltd 39/41 Parkgate Street, Dublin 8, Ireland 39/41 Parkgate Street, Dublin 8, Ireland Point of contact: Point of contact: Telephone: +61 2 9409 0300 Telephone: +61 2 9409 0300 Facsimile: +61 2 9409 0301 Facsimile: +61 2 9409 0301 Email: info@baltimore.com Email: info@baltimore.com URL: http://www.baltimore.com/ URL: http://www.baltimore.com/ 32
  • 33. IACS – COMMUNICATIONS Baltimore ED8000RL Cisco 3640 Router Government Use Only ITSEC E3 and CAPS approved IN EVALUATION ITSEC E2 Certificate Number: 97/92 December 1997 PROJECTED CERTIFICATION DATE: MAY 2001 CLEF: IBM Global Services CLEF: CMG Admiral The ED8000RL is an Ethernet encryptor The Cisco 3640 is a multifunction platform that using the RAMBUTAN algorithm. It provides combines dial access, routing, LAN-to-LAN cryptographic protection for user data services and multiservice integration of voice and transmitted between LANs using Internet data in the same device. As a modular solution, Protocol across WANs. The encryptor is the Cisco 3640 has the flexibility to meet both interposed between a local Ethernet LAN subnet current and future connectivity requirements. and the router giving access to the WAN. The Cisco 3640 is fully supported by Cisco • Central management IOSTM software, which includes LAN-to-LAN • Supports Ethernet V2.0 and IEEE 802.3 frame routing, data and access security and WAN format incorporating SNAP optimization. Applications supported are • Holds up to 16 data keys to enable creation of asynchronous and synchronous serial interfaces. separate cryptographic zones • Supports up to 512 destination IP subnet or device addresses • Data rate exceeds 2Mbits per second • SNMP TRAPs can be sent to a separate NMC SUPPLIER: Cisco Systems Limited 3 The Square, Stockley Park, Uxbridge, Middlesex UB11 1BN, United Kingdom Point of contact: Jon Arnold (For Cisco) Telephone: +44 (0) 208 756 8651 URL: http://j0arnold@cisco.com SYSTEM DESIGNER: Baltimore Technologies Ltd INCA 39/41 Parkgate Street, Dublin 8, Ireland Post Point C2, North Star House, Point of contact: North Star Avenue, Swindon, Wiltshire SN2 1BS Telephone: +61 2 9409 0300 Point of contact: David Grant Facsimile: +61 2 9409 0301 Telephone: +44 (0) 1793 863173 Email: info@baltimore.com Facsimile: +44 (0) 1793 863010 URL: http://www.baltimore.com/ Email: david.w.grant@marconi.com 33
  • 34. IACS – COMMUNICATIONS DataCryptor 2000 Meridian Option 1 (22.46) (Synchronous Line Encryptor) SPC Switch ITSEC E3 IN EVALUATION ITSEC E2 Certificate Number: P126 August 1999 Projected Certification Date: 2Q 2001 CLEF: CMG Admiral CLEF: CMG Admiral The Datacryptor 2000 Link product range are The Meridian Option 61C (22.46) is a state-of- encryption devices specifically designed to the-art Software Stored Program Control Digital provide secure communications over circuits at Switch. Utilised as a platform for integrated voice speeds of up to 2Mbps using a variety of line and data, Meridian Option 61C (22.46) delivers interfaces. The Datacryptor 2000 prevents sophisticated messaging, call centre and unauthorised information access and protects computer telephony integration (CTI) applications against eavesdropping for data transmissions for Asynchronous Transfer Mode (ATM) using both private and public networks. The unit technology. These support WAN bandwidth provides both Tamper Evidence and Tamper consolidation, transport and delivery of Resistance, and once commissioned, will operate multimedia communications. When configured as automatically without further intervention. part of a communications network the switch The Datacryptor 2000 series employ the Zaxus prevents subscribers from gaining access to the Key Management Scheme to securely generate management system and thus provides an and distribute data encryption keys. This assured separation between subscribers and dispenses with the previously time-consuming management traffic. This product is being and laborious tasks associated with secure key evaluated specifically for the MOD’s Defence management which significantly reduces the cost Fixed Telecommunications Service. of ownership. SUPPLIER: Nortel Networks Maidenhead Office Park, Westacott Way, Maidenhead, Berkshire SL1 3OH, United Kingdom Point of contact: Nortel Telephone: +44 (0) 1628 432566 Facsimile: +44 (0) 1628 432657 Zaxus Technical Sales URL: http://nortelnetwork.com Sussex Innovation Centre, Science Park Square, University of Sussex, Brighton BN1 9SB, SYSTEM DESIGNER: United Kingdom INCA Point of contact: Chris Woods, Product Manager Post Point C2, North Star House, (Network Security) North Star Avenue, Swindon, Wiltshire SN2 1BS Telephone: +44 (0)1273 384600 Point of contact: David Grant Facsimile: +44 (0)1273 384601 Telephone: +44 (0) 1793 863173 Email: chris.woods@zaxus.com Facsimile: +44 (0) 1793 863010 URL: http://zaxus.com Email: david.w.grant@marconi.com 34
  • 35. IACS – COMMUNICATIONS Network Security Nortel Switch Nortel Workstation Automated DPN - 100/20 vG36.03 Security Management ITSEC E3 and CAPS approved ITSEC E1 Certificate Number: 97/75 Certificate Number: P142 March 2000 CLEF: Syntegra CLEF: Logica Baltimore’s RAMBUTAN Network Security The Nortel DPN -100/20 switch running software Workstation (NSW) offers users automated Version G36.03 was developed by Nortel and is a security management for the ED2048R3 and switch within DFTS designed to form part of a ED600RTS link encryptors or the ED8000RL LAN packet switched data communications service. IP encryptor. The NSW comprises a PC and a Its purpose is to provide the interface between cryptographic processor, the CG600R. Key user lines and the network. It can be configured distribution is authenticated and encrypted either as an Access Module (AM) or a Resource between the NSW and target encryptors. Module (RM). The latter serves trunks, providing A physical key has to be loaded into encryptors dynamic routing tables, whereas the former six monthly. All other keys are supplied to the serves links and link/trunk interfaces. The switch NSW by CESG. Status, alarm and audit is a component of the DFTS PSS, which has also information can be collected automatically or been evaluated. The Nortel DPN - 100/20 switch under operator control. The NSW is protected by was evaluated against ITSEC E1 assurance password protection mechanisms. Plain text key requirements. material is not accessible by an NSW operator. SUPPLIER: Nortel Networks Maidenhead Office Park, Westacott Way, Maidenhead, Berkshire SL1 3OH, United Kingdom Point of contact: Nortel Telephone: +44 (0) 1628 432566 Facsimile: +44 (0) 1628 432657 URL: http://nortelnetwork.com SYSTEM DESIGNER: Baltimore Technologies Ltd INCA 39/41 Parkgate Street, Dublin 8, Ireland Post Point C2, North Star House, Point of contact: North Star Avenue, Swindon, Wiltshire SN2 1BS Telephone: +61 2 9409 0300 Point of contact: David Grant Facsimile: +61 2 9409 0301 Telephone: +44 (0) 1793 863173 Email: info@baltimore.com Facsimile: +44 (0) 1793 863010 URL: http://www.baltimore.com Email: david.w.grant@marconi.com 35