Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like this, it would be a better world...- Mid-sized
Information security is paramount in the Cloud Computing business. For anyone learning about, planning on moving to, or already in the Cloud, it’s important to know about FIPS 140 certification and the role it plays for information security. What does it mean when software and hardware is FIPS 140 certified? The National Institute of Standards and Technology (NIST) established FIPS 140, short for Federal Information Processing Standard, as a US Government standard and general requirement for any security equipment/system (hardware, firmware, software, or a combination) used by agencies to protect sensitive yet unclassified information. Cryptographic modules themselves, as well as their documentation and source code elements, are included in these standard requirements. FIPS 140 requirements include four security levels and eleven requirement areas: 4 Security levels
User agencies need to confirm that modules in use are covered by a FIPS 140 validation certificate, which specifies the module name, equipment, and version numbers. Vendors do not always maintain their baseline validations, so it is important to ensure their certifications comply with standards to keep your data secure.
Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like...- Mid-sized