SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Specification Sheet




                      Bloombase Spitfire Link Encryptor Net-
                      work Security Server



                      Security
                      IETF IPSec
                      IPv4 and IPv6 support
                      Encapsulating security payload (ESP) support
                      Authentication header (AH) support
                      Internet key exchange (IKE) support
                      Industry-proven cryptographic processing engine
                      NIST FIPS-197 AES encryption and decryption
                      Japan NTT/Mitsubishi Electric Camellia encryption and decryption
                      Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
                      NIST FIPS-46-3 3DES and DES encryption and decryption
                      RC2, RC4, RC5 and RC6 encryption and decryption
                      CAST5 encryption and decryption
                      Twofish and Blowfish encryption and decryption
                      IDEA encryption and decryption
                      Serpent and Skipjack encryption and decryption
                      Pluggable cipher architecture for future cipher upgrade or custom cipher support
                      128, 256, 512, 1024 and 2048 bit public key cryptography
                      RSA and DSA public key cryptography
                      SHA-1, MD5 and Chinese National SCH(SM3) hash generation
                      Shared secret authentication
                      RSA signature authentication
                      Hardware ASIC cryptographic acceleration (optional)




                                                                www.bloombase.com
Key Management
Manual keying or automatic keying
Diffie-Hellman key negotiation
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
Built-in certificate request and revocation check (CRL/OCSP)
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Industry Standard PKCS#11
NIST FIPS-140-1 level 2 cryptographic module support (optional)
Automatic Certificate Retrieval via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocal (OCSP)
CRL scheduled download, caching and automatic retry
OCSP scheduled request, caching and automatic retry



Hardware Security Module Support
Gemalto/Schlumberger/Axalto Cryptoflex
Gemalto/Schlumberger/Axalto Cyberflex
Gemalto/Schlumberger/Axalto e-gate
Gemalto/Gemplus GPK
Aladdin eToken PRO
Hifn Express DS cards
Sun Microsystems Crypto Accelerator cards
Siemens CardOS M4
IBM JCOP
Micardo
Oberthur 64k Java-card
OpenPGP 1.0 card
Setcos 4.4.1 cards
RSA SecurID 3100 cards
Giesecke & Devrient Starcos
Eutrom CryptoIdendity IT-SEC
Rainbow iKey 3000




                                              www.bloombase.com
Standard Support and Certification
OASIS Key Management Interoperability Protocol (KMIP) support
NIST FIPS 140-2 compliant Bloombase Cryptographic Module



Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive



Disaster Recovery
Configurations backup and restore
FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation
High-availability option for active-active or active-standby operation
Stateless active-standby failover



Platform Support
Bloombase SpitfireOS



Hardware Support
i386-base architecture
AMD 32 and 64 architecture
Intel Itanium-2 architecture
IBM Power6 architecture
UltraSPARC architecture
StrongARM architecture




                                             www.bloombase.com
System Requirements
                                                                            System free memory 1GB
                                                                            Free storage space 1GB



                                                                            Warranty and Maintenance
                                                                            Software maintenance and support services are available.




Bloombase Technologies - Information Security Company

email info@bloombase.com
web http://www.bloombase.com


Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products
and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of Bloombase Technologies Ltd in
Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their
respective companies.

The information contained herein is subject to change without notice.
The only warranties for Bloombase products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an addi-
tional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein.

Copyright 2008 Bloombase Technologies. All rights reserved.

Specification Sheet
H87998                                                                                                               www.bloombase.com

Weitere ähnliche Inhalte

Was ist angesagt?

Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90dhape01
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхFujitsu Russia
 
Android modding-source
Android modding-sourceAndroid modding-source
Android modding-sourcePhyo Lay
 
Cisco ipics dispatch console user
Cisco ipics dispatch console userCisco ipics dispatch console user
Cisco ipics dispatch console userambichan
 
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR Introduction
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR IntroductionSurveon NVR5400 Series 64-ch Cost-efficient Storage NVR Introduction
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR IntroductionSurveon Technology Inc.
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTyler Shields
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityVinayak Wadhwa
 

Was ist angesagt? (10)

Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данных
 
Android modding-source
Android modding-sourceAndroid modding-source
Android modding-source
 
Cisco ipics dispatch console user
Cisco ipics dispatch console userCisco ipics dispatch console user
Cisco ipics dispatch console user
 
Soyo syd6iba
Soyo syd6ibaSoyo syd6iba
Soyo syd6iba
 
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR Introduction
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR IntroductionSurveon NVR5400 Series 64-ch Cost-efficient Storage NVR Introduction
Surveon NVR5400 Series 64-ch Cost-efficient Storage NVR Introduction
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
 
Manual 1
Manual 1Manual 1
Manual 1
 

Ähnlich wie Bloombase Spitfire Ethernet Encryptor Specifications

Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase
 
Bloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server SpecificationsBloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server SpecificationsBloombase
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukIntel
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Michelle Holley
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationMichelle Holley
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclavewolfSSL
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Michelle Holley
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase
 
I psec
I psecI psec
I psecnlekh
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewMichelle Holley
 

Ähnlich wie Bloombase Spitfire Ethernet Encryptor Specifications (20)

Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS Specifications
 
Bloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server SpecificationsBloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server Specifications
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway Application
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business Specifications
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
 
Intel core i5
Intel core i5Intel core i5
Intel core i5
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
I psec
I psecI psec
I psec
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology Overview
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 

Mehr von Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

Mehr von Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Kürzlich hochgeladen

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Bloombase Spitfire Ethernet Encryptor Specifications

  • 1. Specification Sheet Bloombase Spitfire Link Encryptor Net- work Security Server Security IETF IPSec IPv4 and IPv6 support Encapsulating security payload (ESP) support Authentication header (AH) support Internet key exchange (IKE) support Industry-proven cryptographic processing engine NIST FIPS-197 AES encryption and decryption Japan NTT/Mitsubishi Electric Camellia encryption and decryption Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption NIST FIPS-46-3 3DES and DES encryption and decryption RC2, RC4, RC5 and RC6 encryption and decryption CAST5 encryption and decryption Twofish and Blowfish encryption and decryption IDEA encryption and decryption Serpent and Skipjack encryption and decryption Pluggable cipher architecture for future cipher upgrade or custom cipher support 128, 256, 512, 1024 and 2048 bit public key cryptography RSA and DSA public key cryptography SHA-1, MD5 and Chinese National SCH(SM3) hash generation Shared secret authentication RSA signature authentication Hardware ASIC cryptographic acceleration (optional) www.bloombase.com
  • 2. Key Management Manual keying or automatic keying Diffie-Hellman key negotiation Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion Built-in certificate request and revocation check (CRL/OCSP) X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Industry Standard PKCS#11 NIST FIPS-140-1 level 2 cryptographic module support (optional) Automatic Certificate Retrieval via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocal (OCSP) CRL scheduled download, caching and automatic retry OCSP scheduled request, caching and automatic retry Hardware Security Module Support Gemalto/Schlumberger/Axalto Cryptoflex Gemalto/Schlumberger/Axalto Cyberflex Gemalto/Schlumberger/Axalto e-gate Gemalto/Gemplus GPK Aladdin eToken PRO Hifn Express DS cards Sun Microsystems Crypto Accelerator cards Siemens CardOS M4 IBM JCOP Micardo Oberthur 64k Java-card OpenPGP 1.0 card Setcos 4.4.1 cards RSA SecurID 3100 cards Giesecke & Devrient Starcos Eutrom CryptoIdendity IT-SEC Rainbow iKey 3000 www.bloombase.com
  • 3. Standard Support and Certification OASIS Key Management Interoperability Protocol (KMIP) support NIST FIPS 140-2 compliant Bloombase Cryptographic Module Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive Disaster Recovery Configurations backup and restore FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration Customer-defined recovery quorum (e.g. 2 of 5) FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation High-availability option for active-active or active-standby operation Stateless active-standby failover Platform Support Bloombase SpitfireOS Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture UltraSPARC architecture StrongARM architecture www.bloombase.com
  • 4. System Requirements System free memory 1GB Free storage space 1GB Warranty and Maintenance Software maintenance and support services are available. Bloombase Technologies - Information Security Company email info@bloombase.com web http://www.bloombase.com Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an addi- tional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Copyright 2008 Bloombase Technologies. All rights reserved. Specification Sheet H87998 www.bloombase.com