Search:
|
Browse by category:
|
Articles
|
||||
![]() |
Why choose Bloombase Security Platform instead of peer solutions?
Bloombase Security Platform is built upon hardened Bloombase OS and Bloombase Security Framework which have been well tested for carrier grade operations serving enterprises, agencies and organizations. Bloombase is compliant to international information security standa...
|
|||
|
||||
![]() |
How Bloombase Security Platform keeps up with ever-changing cryptographic and algorithmic advances?
Cryptographic algorithms and ciphers get updated every couple of years to cope with advances in computational hardware and infrastructure. Bloombase understands customers have growing need to the scope of data protection in their enterprises as well as compliance to the latest se...
|
|||
|
||||
![]() |
Bloombase T10 Vendor ID
T10 vendor ID for Bloombase is 'BLOOMBAS'.
For more information, refer to http://www.t10.org/lists/vid-alph.htm
|
|||
|
||||
![]() |
Bloombase OS, CLI Console and Web Management Console Passwords
Customers should handle Bloombase OS, CLI console and web management console passwords with great care and secrecy as possible. Any of these passwords empowers personnel to gain super-user access to Bloombase Security Systems and potentially gain access to the protected data, sys...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module NIST FIPS 140-2 Security Policy and Certificate
https://csrc.nist.gov/projects/Cryptographic-Module-Validation-Program/Certificate/1241
|
|||
|
||||
![]() |
Bloombase Cryptographic Module NIST RSA Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=RSA&number=496
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#496
http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module SHA Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=SHS&number=991
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#991
http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module RNG Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=RNG&number=591
https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/rng#591
http://csrc.nist.gov/groups/STM/cavp/documents/rng/rngval.html#59...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module Keyed-Hash Message Authentication Code (HMAC) Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=HMAC&number=583
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#583
http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html...
|
|||
|
||||
![]() |
Bloombase Cryptographic Module Advanced Encryption Standard (AES) Validation
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/details?source=AES&number=1041
https://csrc.nist.gov/projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#1041
http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#...
|
|||
|
||||
![]() |
How Bloombase audit trail logs are structured?
Bloombase audit trail is tab delimited log file where system and application log messages are stored composing the following contents:
System date time
Bloombase server host name
Client host name or IP address
User identifier (Administrator ID, u...
|
|||
|
||||
![]() |
Security Product Accreditation by The Third Institute of Ministry of Public Security (MPS) 公安部第三研究所安全防范与信息安全产品及系统检验实验
http://202.127.0.100/cpcx/index.jsp?BulletinID=J150951
|
|||
|
||||
![]() |
How Bloombase helps enterprises achieve Payment Card Industry Data Security Standard (PCI DSS)?
Payment Card Industry Data Security Standard (or PCI DSS in short) was developed by credit card companies including Visa, MasterCard, American Express, Discover and JCB, etc as a guideline to help merchants and transaction processing companies to prevent credit card fraud, cracki...
|
|||
|
||||
![]() |
How Bloombase helps enterprises achieve Sarbanes-Oxley (SOX)?
Sarbanes-Oxley (SOX) Act, passed in year 2002, has huge impact on how enterprises are managed. The Act requires enterprises to change their business processes to adapt to assurance of finance data at high integrity. The act was enacted in response to numerous accounting fraud cau...
|
|||
|
||||
![]() |
How Bloombase helps to achieve Gramm-Leach-Bliley Act (GLBA)?
The United States of America Financial Modernization Act of 1999, also known as the “Gramm-Leach-Bliley Act” or GLB Act (GLBA), includes provisions to protect consumers’ personal financial information held by financial institutions. There are three principal par...
|
|||
|
||||
![]() |
How Bloombase helps customers achieve Personal Data Privacy Ordinance (PDPO) of Hong Kong?
The Office of the Privacy Commissioner for Personal Data has brought the Personal Data Privacy Ordinance in 1996.
The purpose of the Ordinance is to protect the privacy interests of living individuals in relation to personal data. It also contributes to Hong Kong's continued...
|
|||
|
||||
![]() |
How Bloombase helps to achieve various IT security regulatory compliance requirements of Hong Kong Government?
The Government of Hong Kong sets out rules and regulations to ensure government agencies to secure IT infrastructure and electronic data from various vulnerabilities and potential threats
Baseline IT Security Policy (S17)
IT Security Guidelines (G3)
Interne...
|
|||
|
||||
![]() |
Bloombase KeyCastle Security Server Product Roadmap
Accreditations
NIST FIPS 140-2 accreditation
Common Criteria accreditation
Ministry of Public Security accreditation
Interoperability
PKCS#11 hardware security module (HSM) integration
IBM Tivoli Key Lifecycle Manager
RSA Key Manager / Data ...
|
|||
|
||||
![]() |
"Too low max_hw_sectors" on StoreSafe SAN
For StoreSafe SAN target, if the host send SCSI command size bigger the HBA support, there will be I/O error and the following log message will appear in system log:
***ERROR***: Too low max_hw_sectors 65535 sectors
The workaround is to limit the maximum size of the...
|
|||
|
||||