The Global Certification team is delighted to announce that the Cisco Catalyst 6500 has been awarded FIPS 140-2 Level 2 Certification.Certificate #1717!
The certification covers the following: Cisco Catalyst 6506-E , Catalyst 6509-E  and Catalyst 6513-E  Switches with Supervisor Cards (VS-S2T-10G or VS-S2T-10G-XL) and Line Cards (WS-X6908-10G or WS-X6908-10G-2TXL)
- (Hardware Version: 6506-E -M0 , 6509-E -N0 , 6513-E -S0 , Supervisor Card VS-S2T-10G -B0, Supervisor Card VS-S2T-10G-XL -C0, Line Card WS-X6908-10G -A0, Line Card WS-X6908-10G-2TXL version -B0 and FIPS kit packaging (CVPN6500FIPS/KIT=); Firmware Version: 15.0(1)SY1)
Efficiently scale, virtualize, secure, and manage your network remotely with Cisco Catalyst 6500 Series Switches. Offering a high-performance, feature-rich platform suitable for deployment in campus, data center, WAN, and Metro Ethernet networks, the Cisco Catalyst 6500 Series provides a strong foundation for Borderless Networks, so you can connect anyone, anywhere, at any time.
Learn more about the Catalyst 6500 Series on Cisco.com
FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated.
Tags: cat, catalyst, Cisco Catalyst 6500, CTS, routing, TrustSec
I have a confession: I’m a technology late-adopter. On Rogers’ Innovation Adoption bell curve, I probably fall somewhere in the ‘late majority’ — I like the tried and true.
But with a few years and many advances, I’m back on Facebook (my short experience with it left me with privacy paranoia), and if you can believe it, I’m now an iPhone user. I appreciate not lugging around my iPod, and having a camera ready whenever I need it, but it’s not only the extra bells on the integrated device that has impressed me -- it’s the realization that I don’t have to compromise functionality to have it all.
Another technology that has made a lot of strides since its entry into the market is integrated router security. Read More »
Tags: access control, asr 1000, Cisco ISR G2, firewall, security, TrustSec, vpn, VPN routing/forwarding, WAN
It started with the iPhone and really picked up with the iPad. Silver haired gents in corner offices brought their new precious to IT and asked to “get on the network” or “get their email on this.” In the past, IT was able to mumble something about unsupported devices and how a random user who brought a random device was out of luck. After all, they had tested solutions in place, nice things like Windows Mobile and Blackberry, solutions that worked well with Enterprise infrastructure. These new things might be better at Angry Birds or Plants vs Zombies, but the whole BYOD/Enterprise interaction was an unknown and thus a threat and a risk. Poor IT guys got trumped though, silver haired guys said jump and eventually the answer changed from “not supported” to a more career preserving “how high?”
Read More »
Tags: anyconnect, byod, device proliferation, device virtualization, enterprise device management, Mobile Device Management, mobile device security, security, TrustSec, vdi, webinar
Our neighbors in Palo Alto have been making a lot of noise about the difference in price between Hewlett-Packard and Cisco networking equipment. They’d like customers to believe they can offer similar capabilities to Cisco but at much lower prices—“Cisco for less,” if you will.
Most folks understand that the first part of that claim isn’t true. They’re not Cisco. To start with, when a company spends just 2% of revenues on R&D (as HP does), it isn’t capable of generating the type of innovation that a company spending 13% can (as Cisco does). We explained how Cisco innovation delivers differentiated capabilities when we debunked the myth of the ‘Good Enough’ network.
But some customers still ask me about the price difference—the “for less” part. After all, everyone is looking to cut costs, right?
Read More »
Tags: beyond tco, borderless network architecture, Borderless Networks, cisco for less, economics of networking, Energywise, good enough network, medianet, prime network management, ross fowler, tco, total cost of ownership, TrustSec, waas, WAN acceleration
Annalisa Giardina of the Cisco Marketing Team working the booth at RSA 2011
RSA 2011 was a big show for Cisco. We had a 30x30 booth with an in-booth theater, eight demo pods, speakers on several panels, and a keynote. Including speakers, the install and dismantle crew, and all of the booth staffers, we had a crew of around 100 people at the show. Demos included firewalls, virtualization, mobility, web, and security services. With the passing of Cisco Security Monitoring, Analysis, and Response System (MARS), a partner’s SIEM ecosystem display was of note, as were demonstrations of Cisco TrustSec, intrusion prevention, and Cisco Virtualization Experience Infrastructure (VXI). We also demonstrated Cisco AnyConnect running on an iPad, illustrating how Cisco can meet the needs of organizations grappling with the demands of the consumerization of IT and the security concerns that employee liable devices bring.
Read More »
Tags: architecture, Borderless Networks, Cisco, RSA, SecureX, security, Security Intelligence Operations (SIO), TrustSec