Feeds

Cisco okayed for UK government comms

IPSec cleared for most gummint sites

Secure remote control for conventional and virtual desktops

Cisco has had a bunch of products certified as secure by the GCHQ's information security arm, the Communications & Electronics Security Group (CESG).

The certification only covers the products to handle information up to the UK government's “Official” classification – that is, most government information.

However, as the company's principal information assurance architect Mark Jackson is told Clint Winebrenner in this post, “This award represents the first Foundation Grade IPsec VPN product capable of supporting both the CESG interim and PRIME cipher suites, enabling public sector customers to take full advantage of the very latest cryptographic algorithms.”

The post also notes that the classifications in the UK – Official, Secret and Top Secret – were rejigged in April this year with the aim of letting off-the-shelf products handle data at the lowest classification. That means, presumably, that there will be a lot of similar certifications being granted in the future.

“This model includes two grades of assurance; Foundation Grade and High Grade. Foundation Grade products are COTS products designed to provide protection against threats to information classified as OFFICIAL and certification is achieved through the completion of either a Common Criteria or Commercial Product Assurance (CPA) evaluation,” Cisco says.

The certification covers deployments of IPsec VPN technologies both between government sites, and for remote access. Cisco also has its AnyConnect client currently going through certification for mobile access applications.

The certification includes IPsec security gateway products in Cisco's ASA v9.1 family – hardware models 5505, 5510, 5520, 5540, 5550, 5580, 5512-X, 5515-X, 5525-X, 5545-X, 5555-X and 5585-X.

®

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?