SlideShare una empresa de Scribd logo
1 de 5
Specification Sheet




                      Bloombase Spitfire Messaging Security
                      Server



                      Features
                      Transparent SMIME Implementation
                      Spitfire Messaging can integrate with corporate messaging systems to achieve higher level of email security
                      using SMIME industry standard. Outgoing emails are digitally signed and encrypted protecting email con-
                      tents during transmission and as persisted in recipient end. As soon as user requests to read an SMIME
                      protected email, Spitfire Messaging checks for data integrity and readily decrypts data to be viewed by user

                      Email repository storage protection
                      Incoming and out-going plain emails are encrypted before reaching corporate groupware. Emails get
                      persisted in storage in their encrypted form

                      Hardware and Platform Independent
                      Spitfire Messaging Security Server supports all hardware and operating system platforms.

                      High Availability
                      Highly scalable and multiple Spitfire Messaging boxes running in cluster for failover in mission-critical
                      systems and load-balancing for high-throughput enterprise messaging systems.




                      Security
                      Simple Mail Transfer Protocol (SMTP) over secure sockets layer (SSL) or transport layer security (TLS)
                      SMTP authentication (SMTP-AUTH)
                      Message sender identity validation
                      Network-based message relay restriction
                      S/MIME encryption and decryption
                      S/MIME digital signature and verification
                      Industry-proven cryptographic processing engine
                      NIST FIPS-197 AES encryption and decryption
                      Japan NTT/Mitsubishi Electric Camellia encryption and decryption
                      Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
                      NIST FIPS-46-3 3DES encryption and decryption
                      CAST5, RC2 encryption
                      512/1024/2048-bit long X.509 asymmetric key
                      SHA-1, MD5 and Chinese National SCH(SM3) hash generation




                                                                  www.bloombase.com
Messaging
Acts transparently as email proxy server
Supports X.400 Simple Mail Transfer Protocol (SMTP)
Supports messaging servers including Microsoft Exchange, Sun JES, IBM Lotus Notes, Sendmail, etc
Intelligent criteria based message filtering engine
High performance message processing routing engine
Network based message relay enabling/disabling email dispatch via Spitfire Messaging



Message Filtering Criteria
Attachment existence check
Attachment filename pattern check
Header existence and numeric comparison
Mail attribute and value pattern check
Sender address pattern check
Recipient address pattern check
Host and remote address and network check
S/MIME encrypted and/or signed part check
X.509 certificate subject check
Subject pattern check
Spammer blacklist and spam filter
Message size check
Recipient mailbox quota full check



Message Processing and Routing
Message header processing
Message footer processing
Regular expression based message content alteration
Header logging
Message counter
Message bounce
Message forward
Message redirect
Message resend
Message stealth delivery
Sender, postmaster and recipient notification
Local and remote delivery
Mail attribute modification
S/MIME encryption and decryption
S/MIME digital signing and verification
Hierarchical and stacking message router
Delivery status notice (DSN) bounce




                                            www.bloombase.com
Key Management
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
Built-in certificate request and revocation check (CRL/OCSP)
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Industry Standard PKCS#11
NIST FIPS-140-1 level 2 cryptographic module support (optional)
Automatic Certificate Retrieval via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocal (OCSP)
CRL scheduled download, caching and automatic retry
OCSP scheduled request, caching and automatic retry



Hardware Security Module Support
Gemalto/Schlumberger/Axalto Cryptoflex
Gemalto/Schlumberger/Axalto Cyberflex
Gemalto/Schlumberger/Axalto e-gate
Gemalto/Gemplus GPK
Aladdin eToken PRO
Hifn Express DS cards
Sun Microsystems Crypto Acceleator cards
Siemens CardOS M4
IBM JCOP
Micardo
Oberthur 64k Java-card
OpenPGP 1.0 card
Setcos 4.4.1 cards
RSA SecurID 3100 cards
Giesecke & Devrient Starcos
Eutrom CryptoIdendity IT-SEC
Rainbow iKey 3000




                                              www.bloombase.com
High Availability and Clustering
Stateless active-standby failover
Stateful active-standby failover
Stateless active-active round-robin load-balancing
Stateful active-active round-robin load-balancing



Standard Support and Certification
OASIS Key Management Interoperability Protocol (KMIP) support
NIST FIPS 140-2 compliant Bloombase Cryptographic Module



Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive



Disaster Recovery
Configurations backup and restore
FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation
High-availability option for active-active or active-standby operation
Stateless active-standby failover



Platform Support
Bloombase SpitfireOS
Solaris
HP-UX
OpenVMS
IBM AIX
z/OS
AS400
Linux
Microsoft Windows
Mac OS X




                                             www.bloombase.com
Hardware Support
                                                                            i386-base architecture
                                                                            AMD 32 and 64 architecture
                                                                            Intel Itanium-2 architecture
                                                                            IBM Power6 architecture
                                                                            PA-RISC architecture
                                                                            UltraSPARC architecture



                                                                            System Requirements
                                                                            System free memory 512MB
                                                                            Free storage space 512MB



                                                                            Warranty and Maintenance
                                                                            Software maintenance and support services are available.




Bloombase Technologies - Information Security Company

email info@bloombase.com
web http://www.bloombase.com


Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products
and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of Bloombase Technologies Ltd in
Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their
respective companies.

The information contained herein is subject to change without notice.
The only warranties for Bloombase products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an addi-
tional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein.

Copyright 2008 Bloombase Technologies. All rights reserved.

Specification Sheet
H87998                                                                                                               www.bloombase.com

Más contenido relacionado

La actualidad más candente

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04Niit Care
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07Niit Care
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06Niit Care
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05Niit Care
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12Niit Care
 
Introduction To AMF
Introduction To AMFIntroduction To AMF
Introduction To AMFtomhensel
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08Niit Care
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure MobilityCisco Canada
 
SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010hhetter
 

La actualidad más candente (9)

Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
 
Introduction To AMF
Introduction To AMFIntroduction To AMF
Introduction To AMF
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 
SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010
 

Destacado

Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsBloombase
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Bloombase
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Bloombase
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Bloombase
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Bloombase
 

Destacado (8)

Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
 

Similar a Bloombase Spitfire Messaging Security Server Specifications

Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestSandeep Patil
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuArm
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET Journal
 
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 

Similar a Bloombase Spitfire Messaging Security Server Specifications (20)

Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor Specifications
 
Bloombase SpitfireOS Specifications
Bloombase SpitfireOS SpecificationsBloombase SpitfireOS Specifications
Bloombase SpitfireOS Specifications
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Bloombase Keyparc Business Specifications
Bloombase Keyparc Business SpecificationsBloombase Keyparc Business Specifications
Bloombase Keyparc Business Specifications
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
Ip security
Ip security Ip security
Ip security
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 

Más de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

Más de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Bloombase Spitfire Messaging Security Server Specifications

  • 1. Specification Sheet Bloombase Spitfire Messaging Security Server Features Transparent SMIME Implementation Spitfire Messaging can integrate with corporate messaging systems to achieve higher level of email security using SMIME industry standard. Outgoing emails are digitally signed and encrypted protecting email con- tents during transmission and as persisted in recipient end. As soon as user requests to read an SMIME protected email, Spitfire Messaging checks for data integrity and readily decrypts data to be viewed by user Email repository storage protection Incoming and out-going plain emails are encrypted before reaching corporate groupware. Emails get persisted in storage in their encrypted form Hardware and Platform Independent Spitfire Messaging Security Server supports all hardware and operating system platforms. High Availability Highly scalable and multiple Spitfire Messaging boxes running in cluster for failover in mission-critical systems and load-balancing for high-throughput enterprise messaging systems. Security Simple Mail Transfer Protocol (SMTP) over secure sockets layer (SSL) or transport layer security (TLS) SMTP authentication (SMTP-AUTH) Message sender identity validation Network-based message relay restriction S/MIME encryption and decryption S/MIME digital signature and verification Industry-proven cryptographic processing engine NIST FIPS-197 AES encryption and decryption Japan NTT/Mitsubishi Electric Camellia encryption and decryption Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption NIST FIPS-46-3 3DES encryption and decryption CAST5, RC2 encryption 512/1024/2048-bit long X.509 asymmetric key SHA-1, MD5 and Chinese National SCH(SM3) hash generation www.bloombase.com
  • 2. Messaging Acts transparently as email proxy server Supports X.400 Simple Mail Transfer Protocol (SMTP) Supports messaging servers including Microsoft Exchange, Sun JES, IBM Lotus Notes, Sendmail, etc Intelligent criteria based message filtering engine High performance message processing routing engine Network based message relay enabling/disabling email dispatch via Spitfire Messaging Message Filtering Criteria Attachment existence check Attachment filename pattern check Header existence and numeric comparison Mail attribute and value pattern check Sender address pattern check Recipient address pattern check Host and remote address and network check S/MIME encrypted and/or signed part check X.509 certificate subject check Subject pattern check Spammer blacklist and spam filter Message size check Recipient mailbox quota full check Message Processing and Routing Message header processing Message footer processing Regular expression based message content alteration Header logging Message counter Message bounce Message forward Message redirect Message resend Message stealth delivery Sender, postmaster and recipient notification Local and remote delivery Mail attribute modification S/MIME encryption and decryption S/MIME digital signing and verification Hierarchical and stacking message router Delivery status notice (DSN) bounce www.bloombase.com
  • 3. Key Management Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion Built-in certificate request and revocation check (CRL/OCSP) X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Industry Standard PKCS#11 NIST FIPS-140-1 level 2 cryptographic module support (optional) Automatic Certificate Retrieval via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocal (OCSP) CRL scheduled download, caching and automatic retry OCSP scheduled request, caching and automatic retry Hardware Security Module Support Gemalto/Schlumberger/Axalto Cryptoflex Gemalto/Schlumberger/Axalto Cyberflex Gemalto/Schlumberger/Axalto e-gate Gemalto/Gemplus GPK Aladdin eToken PRO Hifn Express DS cards Sun Microsystems Crypto Acceleator cards Siemens CardOS M4 IBM JCOP Micardo Oberthur 64k Java-card OpenPGP 1.0 card Setcos 4.4.1 cards RSA SecurID 3100 cards Giesecke & Devrient Starcos Eutrom CryptoIdendity IT-SEC Rainbow iKey 3000 www.bloombase.com
  • 4. High Availability and Clustering Stateless active-standby failover Stateful active-standby failover Stateless active-active round-robin load-balancing Stateful active-active round-robin load-balancing Standard Support and Certification OASIS Key Management Interoperability Protocol (KMIP) support NIST FIPS 140-2 compliant Bloombase Cryptographic Module Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive Disaster Recovery Configurations backup and restore FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration Customer-defined recovery quorum (e.g. 2 of 5) FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation High-availability option for active-active or active-standby operation Stateless active-standby failover Platform Support Bloombase SpitfireOS Solaris HP-UX OpenVMS IBM AIX z/OS AS400 Linux Microsoft Windows Mac OS X www.bloombase.com
  • 5. Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture PA-RISC architecture UltraSPARC architecture System Requirements System free memory 512MB Free storage space 512MB Warranty and Maintenance Software maintenance and support services are available. Bloombase Technologies - Information Security Company email info@bloombase.com web http://www.bloombase.com Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an addi- tional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Copyright 2008 Bloombase Technologies. All rights reserved. Specification Sheet H87998 www.bloombase.com