Axis FIPS 140-3

Government and critical infrastructure customers of Axis Communications now have the first networked security appliance with an integrated element validated according to the FIPS standard 140-3 level 3 next-generation.

With the introduction of the camera Axis Q1809-LE Bullet, The company has begun its commitment to develop products that meet the Level 3 by FIPS 140-3, by virtue of the compliance with the information processing established by the National Institute of Standards and Technology (Nist).

The FIPS standard 140 specifies the requirements for Security of cryptographic modules that process and guarantee the Confidentiality and integrity of data, which improves the safety of the Government and Critical Infrastructure Customers.

As they point out from the company, Axis is the first company to launch a network security appliance with a secure element, Integrated and validated as set out in the FIPS standard 140-3 level 3 next-generation.

Thanks to FIPS certification 140-3, Axis customers in government and critical infrastructure can be confident that their devices meet NIST-defined security levels, avoiding tampering and identity-focused access.

The built-in discreet secure element –EdgeLock SE052F-, is from the secure connectivity solutions company NXP Semiconductors, and Axis' goal is to continue expanding its range of FIPS-certified devices 140-3 incorporating it into all your upcoming networking products.

FIPS compliance 140-3 will be available for use cases ranging from Surveillance to Business Optimization (through analytics); The Access Control and Audio. Even organizations that are not required to meet the high standards of FIPS will benefit, as they will also have the assurance that their systems are interoperable and that they meet these requirements in the long term.

Secure storage and computation of cryptographic keys is just one component of the hardware-based cybersecurity platform Axis Edge Vault, including features such as secure boot and IEEE 802.1AR compliant ID, that verifies the identity and authenticity of devices from this manufacturer.


You liked this article?

Subscribe to our RSS feed And you won't miss anything.

Other articles on ,
By • 1 Oct, 2024
• Section: Systems control, Computer security, Video surveillance