‘FIPS Inside’ – A Strategic Advantage for FIPS 140-2 Validation
Despite the FUD published by consultants and testing labs that are in favor of wider project scopes, higher pricetags, and shorter shelf-life, ‘FIPS Inside’ can be a huge win for vendors and is explained in this paper.
Top 10 Reasons to Choose SafeLogic Over Open Source
We assembled the most popular reasons reported by our customers for selecting SafeLogic’s encryption modules rather than their open source counterparts.
FedRAMP Requirements for Validated Cryptographic Modules
SafeLogic and Coalfire published a joint whitepaper addressing FedRAMP dependencies on FIPS 140-2 validation.
Champion Research Infographic on the FIPS 140-2 Queue
SafeLogic worked with Champion Research on a survey to shed light on the real-life experiences in the FIPS 140-2 validation process.
SlideShare – Amped for FedRAMP
This deck was developed alongside Intel Security for MISTI’s Cloud Security World 2015, explaining the FedRAMP program and the role of validated encryption for Cloud providers.
Addressing the Encryption Requirements of the Common Criteria Protection Profiles for Mobility
This whitepaper discusses how CryptoComply can help vendors meet the Mobile Device Protection Profile (MDPP) and the Mobile Device Management Protection Profile (MDMPP).
HIPAA Requirements for Encryption
This whitepaper describes the role of encryption in HIPAA regulation and discusses the advantages of CryptoComply in context.
Chapters 3 and 4 from FIPS 140 Demystified: An Introductory Guide for Vendors
By Wes Higaki and Ray Potter. This book is available on Amazon.com.
FISMA Requirements for Validated Cryptographic Modules
This whitepaper explores the relationship between CryptoComply and FISMA. Download to see the mapping of CryptoComply features to FISMA / SP 800-53 security controls.