SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, Sean Houghton, Glenn Rossman, Ignacio M. Llorente

News Feed Item

AccessData Group Achieves Common Criteria Certification for Cyber Intelligence and Response Technology (CIRT)

In a welcome announcement for the new year; AccessData’s CIRT v.2.1.2 has received certification from Common Criteria, an internationally recognized standard for computer security certification, with an Evaluation Assurance Level (EAL) of 3+. Common Criteria provides a set of standards used by the federal government and other organizations to assess the security and assurance of technology products. Common Criteria implements and evaluates solutions, employing rigorous and consistent methodologies, to validate and rate their levels of security assurance. Common Criteria is the driving force for the widest available mutual recognition of secure and trusted IT products.

AccessData chose to invest in the certification to ensure CIRT is endorsed against internationally sanctioned and rigorous security standards. CIRT is the first and only product to integrate network and host forensics, malware analysis, large-scale data auditing and remediation capabilities. The solution delivers the functionality of AccessData’s SilentRunner network forensics solution, AD eDiscovery and AD Enterprise products through a single collaborative interface. Common Criteria has bestowed this certification upon CIRT for its data protection technology, including its ability to provide network surveillance (also, its ability to detect data spillage, and its ability to perform integrated root cause analysis in the event of a security breach). The core technology certified through Common Criteria exists in many of AccessData’s solutions.

This certification ensures the product was methodically tested and checked at an independent lab where a vulnerability analysis demonstrated resistance to penetration attackers. The lab found that CIRT v2.1.2 provides the means to identify and manage inappropriate data hosted on corporate end user workstations, file shares, and email message servers. It offers protection against attempts to breach system security by attackers. The lab gave CIRT its highest rating of all products it is currently testing. The EAL score of 3+ is recognized by all countries participating in the Common Criteria Recognition Arrangement (CCRA).

The evaluators determined that the initialization process is secure and that the security functions are protected against tamper and bypass. User guides were found to be sufficiently descriptive on how to use and administer CIRT, resulting in a secure configuration. The evaluators found that the CIRT v2.1.2 configuration items were clearly marked and the access control measures were effective in preventing unauthorized access to configuration items. AccessData’s configuration management system was also observed during the site visit, and it was found to be mature and well-developed. Evaluators also examined the development security procedures and determined that they detailed sufficient security measures to protect the confidentiality and integrity of the CIRT v2.1.2 design and implementation. Common Criteria noted that AccessData maintains a high-level of end user support for the product. This independent penetration testing did not uncover any exploitable vulnerabilities in the intended operating environment.

CIRT v2.1.2 was subjected to a comprehensive suite of formally documented, independent functional and penetration tests. The testing took place at the Information Technology Security Evaluation and Test (ITSET) Facility at EWA-Canada. The CCS Certification Body witnessed a portion of the independent testing. The developer’s tests and the independent functional tests yielded the expected results, giving assurance that CIRT v2.1.2 is a trusted product that provides the security desired by the most demanding organizations.

AccessData will be hosting a webinar titled, “Cyber Intelligence & Response Technology... What You Don't Know CAN Hurt You” that will highlight many of the key capabilities of the CIRT platform on Thursday, January 31st, at 10am PT / 1pm ET. This event is free to attend, but registration is required.

About AccessData Group:

AccessData Group has pioneered digital investigations and litigation support for 25 years. Its family of stand-alone and enterprise-class solutions, including FTK, SilentRunner, Summation and the CIRT security framework, enable digital investigations of any kind, including computer forensics, incident response, e-discovery, legal review and compliance auditing. More than 130,000 users in law enforcement, government agencies, corporations and law firms worldwide rely on AccessData software solutions and its premier digital investigation and hosted review services. AccessData is also a leading provider of digital forensics and litigation support training and certification. www.accessdata.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
“DevOps is really about the business. The business is under pressure today, competitively in the marketplace to respond to the expectations of the customer. The business is driving IT and the problem is that IT isn't responding fast enough," explained Mark Levy, Senior Product Marketing Manager at Serena Software, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
“The year of the cloud – we have no idea when it's really happening but we think it's happening now. For those technology providers like Zentera that are helping enterprises move to the cloud - it's been fun to watch," noted Mike Loftus, VP Product Management and Marketing at Zentera Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"At our booth we are showing how to provide trust in the Internet of Things. Trust is where everything starts to become secure and trustworthy. Now with the scaling of the Internet of Things it becomes an interesting question – I've heard numbers from 200 billion devices next year up to a trillion in the next 10 to 15 years," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in San...
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Ulunsoft is a start-up that focuses on how enterprises build cloud-based IT infrastructure for business," explained Haibo Zhu, President of Ulunsoft Corp, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
AppDynamics, the application intelligence leader for software-defined businesses, announced the general availability of the AppDynamics Fall '14 Release. Serving the combined needs of IT and business teams across the enterprise, the latest release provides a comprehensive view across all aspects of digital performance in ultra large scale deployments. AppDynamics delivers Application Intelligence by building out advanced capabilities across the key areas of analytics, unified monitoring and D...
In addition, Tesora adds the popular enterprise distribution from Mirantis to the Tesora OpenStack Database Certification Program ensuring compatibility with both NoSQL and SQL database management systems on Trove and eliminating the headache of enterprises having to test integration on their own. "We're providing Mirantis customers with the most production-ready OpenStack Trove implementation, saving the work and time necessary to ensure compatibility," said Ken Rugg, CEO of Tesora. "Working...
Docker containerization is gaining rapid popularity with Software-as-a-Service (SaaS) developers because of clear benefits such as simplified and continuous app delivery. Enterprise developers also want to leverage Docker for easy provisioning and efficient testing, but IT has unique needs that Docker does not solve out-of-the-box, such as security and access control, supporting heterogeneous infrastructure, apps and app stacks, backup and recovery, visibility and monitoring, and integration. Ho...