<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Common Criteria update in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/144354#M22462</link>
    <description>&lt;P&gt;Great news, NIAP has awarded Check Point Software Technologies Ltd a new Common Criteria certification for&lt;STRONG&gt; Security Gateway and Maestro Hyperscale Appliances R81.00.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;A title="NIAP official listing for Common Criteria R81 certification" href="https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235" target="_self"&gt;https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Compliance is claimed against 3 Protection Profiles&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;collaborative Protection Profile for Network Devices Version 2.2e&lt;/LI&gt;
&lt;LI&gt;collaborative Protection Profile Module for Stateful Traffic Filter Firewalls v1.4 + Errata 20200625&lt;/LI&gt;
&lt;LI&gt;PP-Module for Virtual Private Network (VPN) Gateways Version1.1&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Validation identification reference Is VID11235 and the certificate is posted at:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Product Compliant List: &lt;A href="https://ct-url-protection.portal.checkpoint.com/v1/load/GhbZ59H10RXh7hj0AA0pCVysDuKClw5Fahn94Juq61fL4pOMkYlnYIMxSlaY4aypxR1hOFK30INkDLXnHpH9i96T_hMbQjrGCvO3M3-5j3obUL7d-QyltpbsmDfOtJ-sq36gTE_vG-laSKatp2O2nnsbNLiTnQaBvO1aJjEiQuj54mo-J9qo36xXG3WUEX58OHTasEMnarrMx44pHP3E3T7R1R3bYIeju1TWwVGFZkZcRaHExaX_AB3eyhTH7o8BzLSXmgnM7IUYDhurhvB-TW4RQkhuRpU10QPzDZ1qXXKKcpKgpT2bTR3itYpWgHj5rYBsjw6jmSCxj6ZDPVbCRFhUmvHInyDpDfY" target="_blank"&gt;https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Common Criteria Portal: &lt;A href="https://commoncriteriaportal.org/products/" target="_blank"&gt;https://commoncriteriaportal.org/products/&lt;/A&gt;&amp;nbsp; (pending)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also working to gain accreditation at:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;NSA CSfC (Commercial Solutions for Classified)&lt;/LI&gt;
&lt;LI&gt;NATO NIAPC &lt;A href="https://www.ia.nato.int/NIAPC" target="_blank"&gt;(NATO Information Assurance Product Catalogue)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2022 21:17:27 GMT</pubDate>
    <dc:creator>Malcolm_Levy</dc:creator>
    <dc:date>2022-03-21T21:17:27Z</dc:date>
    <item>
      <title>Common Criteria update</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/144354#M22462</link>
      <description>&lt;P&gt;Great news, NIAP has awarded Check Point Software Technologies Ltd a new Common Criteria certification for&lt;STRONG&gt; Security Gateway and Maestro Hyperscale Appliances R81.00.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;A title="NIAP official listing for Common Criteria R81 certification" href="https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235" target="_self"&gt;https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Compliance is claimed against 3 Protection Profiles&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;collaborative Protection Profile for Network Devices Version 2.2e&lt;/LI&gt;
&lt;LI&gt;collaborative Protection Profile Module for Stateful Traffic Filter Firewalls v1.4 + Errata 20200625&lt;/LI&gt;
&lt;LI&gt;PP-Module for Virtual Private Network (VPN) Gateways Version1.1&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Validation identification reference Is VID11235 and the certificate is posted at:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Product Compliant List: &lt;A href="https://ct-url-protection.portal.checkpoint.com/v1/load/GhbZ59H10RXh7hj0AA0pCVysDuKClw5Fahn94Juq61fL4pOMkYlnYIMxSlaY4aypxR1hOFK30INkDLXnHpH9i96T_hMbQjrGCvO3M3-5j3obUL7d-QyltpbsmDfOtJ-sq36gTE_vG-laSKatp2O2nnsbNLiTnQaBvO1aJjEiQuj54mo-J9qo36xXG3WUEX58OHTasEMnarrMx44pHP3E3T7R1R3bYIeju1TWwVGFZkZcRaHExaX_AB3eyhTH7o8BzLSXmgnM7IUYDhurhvB-TW4RQkhuRpU10QPzDZ1qXXKKcpKgpT2bTR3itYpWgHj5rYBsjw6jmSCxj6ZDPVbCRFhUmvHInyDpDfY" target="_blank"&gt;https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Common Criteria Portal: &lt;A href="https://commoncriteriaportal.org/products/" target="_blank"&gt;https://commoncriteriaportal.org/products/&lt;/A&gt;&amp;nbsp; (pending)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also working to gain accreditation at:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;NSA CSfC (Commercial Solutions for Classified)&lt;/LI&gt;
&lt;LI&gt;NATO NIAPC &lt;A href="https://www.ia.nato.int/NIAPC" target="_blank"&gt;(NATO Information Assurance Product Catalogue)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 21:17:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/144354#M22462</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-03-21T21:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria update</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/144356#M22463</link>
      <description>&lt;P&gt;EAL4+ Update:&lt;/P&gt;
&lt;P&gt;We are currently&amp;nbsp; certifying at EAL4+&amp;nbsp; Check Point R81.10 for Gateway and Maestro Configurations&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 21:28:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/144356#M22463</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-03-21T21:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria update</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/149874#M24075</link>
      <description>&lt;P&gt;NSA CSFC:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The listing was accepted for protecting classified data&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="responsive" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="entry-header"&gt;Check Point Software Technologies&lt;/TD&gt;
&lt;TD&gt;Security Gateway and Maestro Hyperscale Appliances (3600, 3800, 6200, 6400, 6600, 6700, 6900, 7000, 16000, 16200, 16600, 26000, 28000, 239**, Smart-1 525, Smart-1 600-S, Smart-1 600-M, Smart-1 6000-L, Smart-1 6000-XL and ESXi 7.0 (HPE D360 G10)&lt;/TD&gt;
&lt;TD&gt;R81.00&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11235" target="_blank"&gt;NIAP Validation Completed (at Gossamer)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 31 May 2022 20:40:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/149874#M24075</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-05-31T20:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria update</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/149875#M24076</link>
      <description>&lt;P&gt;The NATO NIAPC is no longer active. I was informed that&amp;nbsp;funding for the NIAPC was terminated back in 2014. Since then the catalog was offered as a best effort service. The NIAPC is no longer available on the internet or any NATO network by the NCI Agency. The service is no longer offered as seen by the URL&amp;nbsp; that reports Service Unavailable&amp;nbsp;&amp;nbsp;&lt;A href="https://www.ia.nato.int/niapc/Information/NIAPC-vendor-info" target="_blank"&gt;https://www.ia.nato.int/niapc/Information/NIAPC-vendor-info&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 20:44:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/149875#M24076</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-05-31T20:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria update</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/166688#M30013</link>
      <description>&lt;P&gt;Check Point was awarded EAL4+ for R81.10.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Supporting appliances are listed in the Security Target and Validator report. Supporting appliances include Enterprise Gateways, Smart-1, Maestro and Maestro Hyperscale Orchestrator&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Full details in&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173465" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173465&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The listing can be seen here:&amp;nbsp;&lt;A href="https://www.tuv-nederland.nl/common-criteria/certificates.html" target="_blank" rel="noopener"&gt;https://www.tuv-nederland.nl/common-criteria/certificates.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 15:07:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Common-Criteria-update/m-p/166688#M30013</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2023-01-04T15:07:43Z</dc:date>
    </item>
  </channel>
</rss>

