SlideShare une entreprise Scribd logo
1  sur  4
Specification Sheet




                      Bloombase Spitfire KeyCastle Key Life-
                      Cycle Management Security Server



                      Features
                      Cryptographic Key Life-Cycle Management
                      Spitfire KeyCastle Security Server supports key generation, storage and protection, and is equipped with
                      rich cryptographic cipher algorithms for enterprises and organizations meeting stringent information secu-
                      rity compliance standards.

                      Tamper-proof and Tamper-resistant
                      Spitfire KeyCastle Security Server supports tamper-proof and tamper-resistant NIST FIPS 140-2 level-3
                      hardware security modules (optional).

                      High Performance
                      Cryptographic processing can further improve with optional PKCS#11 hardware cryptographic acceleration
                      modules to minimize performance impact to your mission-critical systems.




                      Security
                      NIST FIPS 197 AES encryption and decryption (NIST certificate #1041)
                      RSA public key cryptography (NIST certificate #496)
                      SHA-1, SHA-256, SHA-384, SHA-512 hash generation (NIST certificate #991)
                      Proven keyed-hash message authentication code generation (NIST certificate #583)
                      Proven random number generator (NIST certificate #591)
                      Japan NTT/Mitsubishi Camellia encryption and decryption
                      Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
                      NIST FIPS 46-3 3DES and DES encryption and decryption
                      RC2, RC4, RC5 and RC6 encryption and decryption
                      CAST5 encryption and decryption
                      Twofish and Blowfish encryption and decryption
                      IDEA encryption and decryption
                      Serpent and Skipjack encryption and decryption
                      DSA public key cryptography
                      MD5 and Chinese National SCH(SM3) hash generation
                      Pluggable cipher architecture for future cipher upgrade or custom cipher support
                      Hardware ASIC cryptographic acceleration (optional)




                                                                www.bloombase.com
Key Management
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
No limitation on number of cryptographic keys managed or scales with system storage infrastructure
Built-in certificate request and revocation check (CRL/OCSP)
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Industry Standard PKCS#11
NIST FIPS-140-1 level 2 cryptographic module support (optional)
Automatic Certificate Retrieval via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocal (OCSP)
CRL scheduled download, caching and automatic retry
OCSP scheduled request, caching and automatic retry



Hardware Security Module Support
Gemalto/Schlumberger/Axalto Cryptoflex
Gemalto/Schlumberger/Axalto Cyberflex
Gemalto/Schlumberger/Axalto e-gate
Gemalto/Gemplus GPK
Aladdin eToken PRO
Hifn Express DS cards
Sun Microsystems Crypto Acceleator cards
Siemens CardOS M4
IBM JCOP
Micardo
Oberthur 64k Java-card
OpenPGP 1.0 card
Setcos 4.4.1 cards
RSA SecurID 3100 cards
Giesecke & Devrient Starcos
Eutrom CryptoIdendity IT-SEC
Rainbow iKey 3000



Standard Support and Certification
OASIS Key Management Interoperability Protocol (KMIP) compliant
NIST FIPS 140-2 compliant Bloombase Cryptographic Module




                                              www.bloombase.com
Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive



Client Accessibility
PKCS#11
OpenSSL
Java JCA/JCE
Web services
Plain socket
HTTP/HTTPS
Java HTTP tunneling
Java Remote Method Invocation (RMI)
Native language support: C, C++, Java
PKI-based client authentication and identity management
PKI-based channel encryption



Disaster Recovery
Configurations backup and restore
FIPS 140 hardware security module recovery key or software recovery key vault for settings restoration
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS 140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation
High-availability option for active-active or active-standby operationStateless active-standby failover



Platform Support
Bloombase SpitfireOS
Solaris
HP-UX
OpenVMS
IBM AIX
Linux
Microsoft Windows
Mac OS X




                                             www.bloombase.com
Hardware Support
                                                                            i386-base architecture
                                                                            AMD 32 and 64 architecture
                                                                            Intel Itanium-2 architecture
                                                                            IBM Power6 architecture
                                                                            PA-RISC architecture
                                                                            UltraSPARC architecture



                                                                            System Requirements
                                                                            System free memory 512MB
                                                                            Free storage space 512MB



                                                                            Warranty and Maintenance
                                                                            Software maintenance and support services are available.




Bloombase Technologies - Information Security Company

email info@bloombase.com
web http://www.bloombase.com


Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products
and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of Bloombase Technologies Ltd in
Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their
respective companies.

The information contained herein is subject to change without notice.
The only warranties for Bloombase products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an addi-
tional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein.

Copyright 2008 Bloombase Technologies. All rights reserved.

Specification Sheet
H87998                                                                                                               www.bloombase.com

Contenu connexe

Tendances

Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
CamTESOL2015
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
shah_ril1512
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
 

Tendances (19)

CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
ccna1 v5 cap2
ccna1 v5 cap2ccna1 v5 cap2
ccna1 v5 cap2
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating System
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux EmbarcadoTDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcado
 
EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
Fortigate Modelo 90d
Fortigate Modelo 90dFortigate Modelo 90d
Fortigate Modelo 90d
 

En vedette

Families and Friends of Murder Victims October 2015 newsletter
Families and Friends of Murder Victims October 2015 newsletterFamilies and Friends of Murder Victims October 2015 newsletter
Families and Friends of Murder Victims October 2015 newsletter
Rose Madsen
 
Meetup Seo, Cloud computing & ERP.
Meetup Seo, Cloud computing & ERP.Meetup Seo, Cloud computing & ERP.
Meetup Seo, Cloud computing & ERP.
Meetup Emprendedores
 
Subsanar salud i.p.s
Subsanar salud i.p.sSubsanar salud i.p.s
Subsanar salud i.p.s
erikajaimes
 
Caifanes matenme por que me muero
Caifanes matenme por que me mueroCaifanes matenme por que me muero
Caifanes matenme por que me muero
Eduardo Rolas
 

En vedette (20)

Estrategia viral con Facebook
Estrategia viral con FacebookEstrategia viral con Facebook
Estrategia viral con Facebook
 
Families and Friends of Murder Victims October 2015 newsletter
Families and Friends of Murder Victims October 2015 newsletterFamilies and Friends of Murder Victims October 2015 newsletter
Families and Friends of Murder Victims October 2015 newsletter
 
Meetup Seo, Cloud computing & ERP.
Meetup Seo, Cloud computing & ERP.Meetup Seo, Cloud computing & ERP.
Meetup Seo, Cloud computing & ERP.
 
Falsos cristos y falsos profetas
Falsos cristos y falsos profetasFalsos cristos y falsos profetas
Falsos cristos y falsos profetas
 
islas galapagos
islas galapagosislas galapagos
islas galapagos
 
Subsanar salud i.p.s
Subsanar salud i.p.sSubsanar salud i.p.s
Subsanar salud i.p.s
 
Jvg u1 a2_#
Jvg u1 a2_#Jvg u1 a2_#
Jvg u1 a2_#
 
Holi ppt to financial institution
Holi   ppt to financial institutionHoli   ppt to financial institution
Holi ppt to financial institution
 
Preview lettre d'asf
Preview lettre d'asfPreview lettre d'asf
Preview lettre d'asf
 
AHIP - Path to Consumer Engagement with MedHelp - Yurkovic
AHIP - Path to Consumer Engagement with MedHelp - Yurkovic AHIP - Path to Consumer Engagement with MedHelp - Yurkovic
AHIP - Path to Consumer Engagement with MedHelp - Yurkovic
 
Research Questions
Research QuestionsResearch Questions
Research Questions
 
Gamma software introduction
Gamma software introductionGamma software introduction
Gamma software introduction
 
Curriculum artistico
Curriculum artisticoCurriculum artistico
Curriculum artistico
 
Common Purpose Hamburg
Common Purpose HamburgCommon Purpose Hamburg
Common Purpose Hamburg
 
Caifanes matenme por que me muero
Caifanes matenme por que me mueroCaifanes matenme por que me muero
Caifanes matenme por que me muero
 
How to turn your inbox into a productivity engine - PCMA Convening Leaders 2015
How to turn your inbox into a productivity engine - PCMA Convening Leaders 2015How to turn your inbox into a productivity engine - PCMA Convening Leaders 2015
How to turn your inbox into a productivity engine - PCMA Convening Leaders 2015
 
Electricidad inalámbrica
Electricidad inalámbricaElectricidad inalámbrica
Electricidad inalámbrica
 
El profeta ISAIAS y las pequeñas comunidades EAS - Antonio Hortelano
El profeta ISAIAS y las pequeñas comunidades EAS - Antonio HortelanoEl profeta ISAIAS y las pequeñas comunidades EAS - Antonio Hortelano
El profeta ISAIAS y las pequeñas comunidades EAS - Antonio Hortelano
 
SuisseID Forum 2015 | Bankkonto-Eröffnung übers Internet
SuisseID Forum 2015 | Bankkonto-Eröffnung übers InternetSuisseID Forum 2015 | Bankkonto-Eröffnung übers Internet
SuisseID Forum 2015 | Bankkonto-Eröffnung übers Internet
 
hangul
hangulhangul
hangul
 

Similaire à Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications

Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
Bloombase
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
Bloombase
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS Specifications
Bloombase
 
Bloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server SpecificationsBloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server Specifications
Bloombase
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business Specifications
Bloombase
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 

Similaire à Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications (20)

Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS Specifications
 
Bloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server SpecificationsBloombase Keyparc Business Enterprise Server Specifications
Bloombase Keyparc Business Enterprise Server Specifications
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business Specifications
 
Intel core i5
Intel core i5Intel core i5
Intel core i5
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology Overview
 
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture
 
AXONIM 2018 embedded systems development
AXONIM 2018 embedded systems developmentAXONIM 2018 embedded systems development
AXONIM 2018 embedded systems development
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway Application
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 

Plus de Bloombase

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications

  • 1. Specification Sheet Bloombase Spitfire KeyCastle Key Life- Cycle Management Security Server Features Cryptographic Key Life-Cycle Management Spitfire KeyCastle Security Server supports key generation, storage and protection, and is equipped with rich cryptographic cipher algorithms for enterprises and organizations meeting stringent information secu- rity compliance standards. Tamper-proof and Tamper-resistant Spitfire KeyCastle Security Server supports tamper-proof and tamper-resistant NIST FIPS 140-2 level-3 hardware security modules (optional). High Performance Cryptographic processing can further improve with optional PKCS#11 hardware cryptographic acceleration modules to minimize performance impact to your mission-critical systems. Security NIST FIPS 197 AES encryption and decryption (NIST certificate #1041) RSA public key cryptography (NIST certificate #496) SHA-1, SHA-256, SHA-384, SHA-512 hash generation (NIST certificate #991) Proven keyed-hash message authentication code generation (NIST certificate #583) Proven random number generator (NIST certificate #591) Japan NTT/Mitsubishi Camellia encryption and decryption Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption NIST FIPS 46-3 3DES and DES encryption and decryption RC2, RC4, RC5 and RC6 encryption and decryption CAST5 encryption and decryption Twofish and Blowfish encryption and decryption IDEA encryption and decryption Serpent and Skipjack encryption and decryption DSA public key cryptography MD5 and Chinese National SCH(SM3) hash generation Pluggable cipher architecture for future cipher upgrade or custom cipher support Hardware ASIC cryptographic acceleration (optional) www.bloombase.com
  • 2. Key Management Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion No limitation on number of cryptographic keys managed or scales with system storage infrastructure Built-in certificate request and revocation check (CRL/OCSP) X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Industry Standard PKCS#11 NIST FIPS-140-1 level 2 cryptographic module support (optional) Automatic Certificate Retrieval via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocal (OCSP) CRL scheduled download, caching and automatic retry OCSP scheduled request, caching and automatic retry Hardware Security Module Support Gemalto/Schlumberger/Axalto Cryptoflex Gemalto/Schlumberger/Axalto Cyberflex Gemalto/Schlumberger/Axalto e-gate Gemalto/Gemplus GPK Aladdin eToken PRO Hifn Express DS cards Sun Microsystems Crypto Acceleator cards Siemens CardOS M4 IBM JCOP Micardo Oberthur 64k Java-card OpenPGP 1.0 card Setcos 4.4.1 cards RSA SecurID 3100 cards Giesecke & Devrient Starcos Eutrom CryptoIdendity IT-SEC Rainbow iKey 3000 Standard Support and Certification OASIS Key Management Interoperability Protocol (KMIP) compliant NIST FIPS 140-2 compliant Bloombase Cryptographic Module www.bloombase.com
  • 3. Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive Client Accessibility PKCS#11 OpenSSL Java JCA/JCE Web services Plain socket HTTP/HTTPS Java HTTP tunneling Java Remote Method Invocation (RMI) Native language support: C, C++, Java PKI-based client authentication and identity management PKI-based channel encryption Disaster Recovery Configurations backup and restore FIPS 140 hardware security module recovery key or software recovery key vault for settings restoration Customer-defined recovery quorum (e.g. 2 of 5) FIPS 140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation High-availability option for active-active or active-standby operationStateless active-standby failover Platform Support Bloombase SpitfireOS Solaris HP-UX OpenVMS IBM AIX Linux Microsoft Windows Mac OS X www.bloombase.com
  • 4. Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture PA-RISC architecture UltraSPARC architecture System Requirements System free memory 512MB Free storage space 512MB Warranty and Maintenance Software maintenance and support services are available. Bloombase Technologies - Information Security Company email info@bloombase.com web http://www.bloombase.com Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an addi- tional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Copyright 2008 Bloombase Technologies. All rights reserved. Specification Sheet H87998 www.bloombase.com