Skip to main content

VMware Infrastructure Earns Security Certification for Stringent Government Standards

PALO ALTO, Calif.--(BUSINESS WIRE)--VMware, Inc., (NYSE:VMW), the global leader in virtualization solutions from the desktop to the datacenter, today announced that VMware Infrastructure 3, VMware ESX Server 3.0.2 and VMware VirtualCenter 2.0.2 have earned Common Criteria Evaluation Assurance Level 4 (EAL4+) certification under the Communications Security Establishment Canada (CSEC) Common Criteria Evaluation and Certification Scheme (CCS), following an extensive analysis and testing process. The EAL4+ rating is the highest assurance level that is recognized by all signatories under the Common Criteria Certificates (CCRA).

Passing this rigorous, globally recognized certification process demonstrates our commitment to delivering secure, reliable virtualization products, said Dr. Stephen Herrod, chief technology officer for VMware. Earning the EAL4+ rating reinforces that VMware Infrastructure is the among the most proven and trusted ways to run enterprise-class applications. It can be used not just for commercial computing, but for sensitive, government computing environments that demand the strictest security.

Many government agencies are in fact using VMware software. VMwares more than 100,000 customers include all 15 cabinet level agencies, all branches of the military, the Department of Defense Joint Commands, numerous independent agencies, as well as customers in the Judicial and Legislative branches in the United States.

Common Criteria is an internationally recognized set of guidelines (ISO 15408) that define a common framework for evaluating security features and capabilities of Information Technology security products. The standard consists of several predetermined evaluation assurance levels, each one more stringent than the last. Common Criteria allows vendors to have their products tested against a chosen level by an independent third-party testing laboratory. Common Criteria certifications are accepted by 25 countries, including the U.S. government, through the Common Criteria Recognition Agreement (CCRA). Common Criteria certification of security products is mandated by the U.S. government for all federal purchases.

To facilitate the prompt completion of the Common Criteria certification, VMware worked with Corsec Security, Inc., a consulting firm with more than 10 years of validation experience.

Corsec is very pleased to have worked with VMware on their Common Criteria evaluation, said Matthew Appler, CEO, Corsec Security, Inc. The Common Criteria evaluation process is an extremely rigorous and time consuming investment. VMwares decision to deliver a product evaluated at an EAL4+ demonstrates their strong dedication and commitment to their customers.



Link

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!