Search:
|
Browse by category:
|
Articles
|
||||
![]() |
What is the Internet Assigned Numbers Authority (IANA) enterprise ID assignment for Bloombase?
The Internet Assigned Numbers Authority (IANA) enterprise ID for Bloombase is 23372.
For more information, check out https://www.iana.org/assignments/enterprise-numbers/enterprise-numbers.
|
|||
|
||||
![]() |
What are the Institute of Electrical and Electronics Engineers (IEEE) IDs assigned to Bloombase?
Bloombase has the following IDs assigned by Institute of Electrical and Electronics Engineers (IEEE):
OUI: F0-3A-4B
company_id: F03A4B
MAC Address: F0:3A:4B
For more information, check out https://standards.ieee.org/develop/regauth/oui/oui.txt and https://re...
|
|||
|
||||
![]() |
What is the vendor ID (VID) assigned for Bloombase by Peripheral Component Interconnect Special Interest Group (PCI-SIG)?
The vendor ID (VID) for Bloombase assigned by Peripheral Component Interconnect Special Interest Group (PCI-SIG) is:
187 (Dec)
0x00BB (Hex)
For more information, check out https://pcisig.com/membership/member-companies
|
|||
|
||||
![]() |
What are the Apple Bundle IDs assigned to Bloombase?
Bloombase is assigned the following Apple Bundle IDs:
com.bloombase
com.keyparc
|
|||
|
||||
![]() |
What Post-Quantum Cryptography (PQC) cipher algorithms are supported by the Bloombase products
Bloombase products support the following NIST standard Post-Quantum Cryptography (PQC) cipher algorithms:
Public-Key Encryption and Key-Establishment (KEM) Algorithms
CRYSTALS-KYBER
Digital Signature Algorithms
CRYSTALS-Dilithium
Falcon
SPH...
|
|||
|
||||
![]() |
What are the list of certifications achieved by Bloombase Cryptographic Module?
The Bloombase Cryptographic Module has achieved Cryptographic Algorithm Validation Program (CAVP) issued by NIST.
For more, check out https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?product=2701.
|
|||
|
||||
![]() |
Why choose Bloombase Security Platform instead of peer solutions?
Bloombase Security Platform is built upon hardened Bloombase OS and Bloombase Security Framework which have been well tested for carrier grade operations serving enterprises, agencies and organizations. Bloombase is compliant to international information security standa...
|
|||
|
||||
![]() |
How Bloombase Security Platform keeps up with ever-changing cryptographic and algorithmic advances?
Cryptographic algorithms and ciphers get updated every couple of years to cope with advances in computational hardware and infrastructure. Bloombase understands customers have growing need to the scope of data protection in their enterprises as well as compliance to the latest se...
|
|||
|
||||
![]() |
What is the InterNational Committee for Information Technology Standards (INCITS) T10 Vendor ID for Bloombase?
The InterNational Committee for Information Technology Standards (INCITS) T10 vendor ID for Bloombase is 'BLOOMBAS'.
For more information, refer to http://www.t10.org/lists/vid-alph.htm.
|
|||
|
||||
![]() |
Bloombase OS, CLI Console and Web Management Console Passwords
Customers should handle Bloombase OS, CLI console and web management console passwords with great care and secrecy as possible. Any of these passwords empowers personnel to gain super-user access to Bloombase Security Systems and potentially gain access to the protected data, sys...
|
|||
|
||||
![]() |
The National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Security Policy and Certificate for Bloombase Cryptographic Module
The National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Security Policy and Certificate for Bloombase Cryptographic Module can be found at below link:
https://csrc.nist.gov/projects/Cryptographic-Module-Validation-Progr...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module SHA Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=SHS&number=991
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#991
http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module NIST RSA Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=RSA&number=496
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#496
http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module RNG Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=RNG&number=591
https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/rng#591
http://csrc.nist.gov/groups/STM/cavp/documents/rng/rngval.html#59...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module Keyed-Hash Message Authentication Code (HMAC) Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=HMAC&number=583
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#583
http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module Advanced Encryption Standard (AES) Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=AES&number=1041
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#1041
http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#...
|
|||
|
||||
![]() |
How Bloombase audit trail logs are structured?
Bloombase audit trail is tab delimited log file where system and application log messages are stored composing the following contents:
System date time
Bloombase server host name
Client host name or IP address
User identifier (Administrator ID, u...
|
|||
|
||||
![]() |
How Bloombase helps enterprises achieve Payment Card Industry Data Security Standard (PCI DSS)?
Payment Card Industry Data Security Standard (or PCI DSS in short) was developed by credit card companies including Visa, MasterCard, American Express, Discover and JCB, etc as a guideline to help merchants and transaction processing companies to prevent credit card fraud, cracki...
|
|||
|
||||
![]() |
How Bloombase helps enterprises achieve Sarbanes-Oxley (SOX)?
Sarbanes-Oxley (SOX) Act, passed in year 2002, has huge impact on how enterprises are managed. The Act requires enterprises to change their business processes to adapt to assurance of finance data at high integrity. The act was enacted in response to numerous accounting fraud cau...
|
|||
|
||||
![]() |
How Bloombase helps to achieve Gramm-Leach-Bliley Act (GLBA)?
The United States of America Financial Modernization Act of 1999, also known as the “Gramm-Leach-Bliley Act” or GLB Act (GLBA), includes provisions to protect consumers’ personal financial information held by financial institutions. There are three principal par...
|
|||
|
||||
![]() |
How Bloombase helps customers achieve Personal Data Privacy Ordinance (PDPO) of Hong Kong?
The Office of the Privacy Commissioner for Personal Data has brought the Personal Data Privacy Ordinance in 1996.
The purpose of the Ordinance is to protect the privacy interests of living individuals in relation to personal data. It also contributes to Hong Kong's continued...
|
|||
|
||||
![]() |
How Bloombase helps to achieve various IT security regulatory compliance requirements of Hong Kong Government?
The Government of Hong Kong sets out rules and regulations to ensure government agencies to secure IT infrastructure and electronic data from various vulnerabilities and potential threats
Baseline IT Security Policy (S17)
IT Security Guidelines (G3)
Interne...
|
|||
|
||||
![]() |
Bloombase KeyCastle Security Server Product Roadmap
Accreditations
NIST FIPS 140-2 accreditation
Common Criteria accreditation
Ministry of Public Security accreditation
Interoperability
PKCS#11 hardware security module (HSM) integration
IBM Tivoli Key Lifecycle Manager
RSA Key Manager / Data ...
|
|||
|
||||
![]() |
"Too low max_hw_sectors" on StoreSafe SAN
For StoreSafe SAN target, if the host send SCSI command size bigger the HBA support, there will be I/O error and the following log message will appear in system log:
***ERROR***: Too low max_hw_sectors 65535 sectors
The workaround is to limit the maximum size of the...
|
|||
|
||||