1How to Ensure Your Organization’s Network Is Safe From Intrusion
Establishing trust between the enterprise and its IT infrastructure is an essential part of security. Organizations must be confident that valuable data transmitted across a network is safe from theft and intrusion. This notion of trust implies the need for independent bodies to define what constitutes a secure solution. The National Institute of Standards and Technology (NIST), Common Criteria and ANSSI have established guidelines for all aspects of secure IT solutions, including hardware and software design, supply chain and process control. For the enterprise, trust is established through solutions that are evaluated by independent laboratories for compliance with these standards. In this eWEEK slide show, using industry information from Nokia security expert Chris Janson, we examine some of those criteria.
2Security Is Trust
3Encryption Is but One Segment of Data Security
4AES-256: The Gold Standard of Encryption
5Key Strength and Quality Are Essential
6Supply Chain Must Be Trustworthy
7What Are Crypto Certifications?
8FIPS 140-2
9CC EAL
10ANSSI
11Trust but Verify Through Independent Certifications
Security solutions must be built upon trust with the vendors supplying them. Security features and compliance with independent standards should be verified through independent laboratory evaluation.