eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194

CSV information ?

Status archived
Valid from 25.05.2007
Valid until 06.09.2012
Scheme 🇺🇸 US
Manufacturer eEye Digital Security Corporation
Category Operating Systems
Security level EAL2

Heuristics summary ?

Certificate ID: CCEVS-VR-0043-2007

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSL

Vendor
Microsoft

Security level
EAL 2, EAL2
Certificates
CCEVS-VR-07-0043

Standards
CCIMB-2004-01-004

File metadata

Title Validation Report for eEye Retina Network Security Scanner
Author Tony Apted
Creation date D:20070615142322-04'00'
Modification date D:20070615142351-04'00'
Pages 16
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-07-0043
Certified item Retina Enterprise Suite
Certification lab US NIAP

Security target ?

Extracted keywords

Schemes
MAC
Protocols
SSL
Libraries
NSS

Vendor
Microsoft

Security level
EAL2, EAL 2
Claims
O.PROTECT, O.NSSCAN, O.NSSANLZ, O.EADMIN, O.ACCESS, O.IDAUTH, O.INTEGR, O.CREDEN, O.INSTAL, O.INTROP, O.PERSON, O.PHYCAL, O.OFLOWS, T.COMINT, T.COMDIS, T.LOSSOF, T.PRIVIL, T.IMPCON, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALREC, T.FALASC, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTECT, A.SYSPROTECT, A.TIME, A.MANAGE, A.NOEVIL, A.NOTRST, OE.AUTH_ACCESS, OE.IDAUTH, OE.SEP, OE.TIME, OE.AUTH_ACCES
Security Assurance Requirements (SAR)
ACM_CAP, ACM_CAP.2, ADO_DEL, ADO_IGS, ADO_DEL.1, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_RCR, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF, AVA_VLA, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU, FIA_UID, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_STM.1, FPT_ITT.1, FPT_ITT.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_RVM

Standards
ISO/IEC 15408, ISO/IEC 15408-2, ISO/IEC 15408-3

File metadata

Title eEye Digital Retina Enterprise Suite Security Target
Subject Security Target
Keywords Security Target
Author SAIC CCTL
Creation date D:20070615131908-04'00'
Modification date D:20070615132215-04'00'
Pages 38
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Heuristics ?

Certificate ID: CCEVS-VR-0043-2007

Extracted SARs

ADV_FSP.1, AVA_SOF.1, AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ATE_FUN.1, ADV_RCR.1, AGD_USR.1, ADV_HLD.1, ATE_IND.2

Similar certificates

Name Certificate ID
eEye Retina Network Security Scanner Version 5.4.21.53 CCEVS-VR-0044-2007 Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP 106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0054-2006 Compare
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) CCEVS-VR-VID-10273-2010 Compare
NATEK Security Information and Event Management SIEM GUI v2.0.2 with SIEM SERVER v6.2.0 and SIEM RECORDER v9.2.2 and SIEM AGENT v6.1.0 21.0.03/TSE-CCCS-36 Compare
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21 ISCB-5-RPT-C034-CR-v1a Compare
xPortalNet HS Server version 2.0.0.2, xPortalNet HS Client version 2.0.0.2 and Xp-GLS5100 Controllers ISCB-3-RPT-C092-CR-v1 Compare
DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0139-2005 Compare
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A ANSSI-CC-2020/70 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0324 Compare
McAfee Threat Intelligence Exchange 2.0.0 and Data Exchange Layer 3.0.0 with ePolicy Orchestrator 5.3.2 383-4-396 Compare
IBM Internet Security Systems GX6116 Network IPS Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 CCEVS-VR-VID-10320-2011 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imagio MP C4001 SPF Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0301 Compare
Showing 5 out of 17.

Scheme data ?

Product eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194
Id CCEVS-VR-VID10034
Url https://www.niap-ccevs.org/product/10034
Certification Date 25.05.2007
Expiration Date None
Category Wireless Monitoring
Vendor eEye Digital Security Corporation
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2007-05-25'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bef753b821b483861fd030f54176d6d2fa845b780ea3e53fead45dc2b94a341a', 'txt_hash': 'ec7ff74aa5622f8e5e319916f94ed265138a64a88a25df764c68da6892d5e78b'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '872049f1b73b230436adbf36d1f7b0090845e2236f80eb3f697b7b7ad2509817', 'txt_hash': 'e3f09d65ec6ce23c78edb797ba794529337c522708adbd09f36181fa0f1afe4d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 121865, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20070615142322-04'00'", '/Author': 'Tony Apted', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20070615142351-04'00'", '/SourceModified': 'D:20070615182254', '/Title': 'Validation Report for eEye Retina Network Security Scanner', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 433295, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/CreationDate': "D:20070615131908-04'00'", '/Subject': 'Security Target', '/Author': 'SAIC CCTL', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Keywords': 'Security Target', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20070615132215-04'00'", '/Company': 'SAIC', '/Manager': 'Julie Taylor', '/SourceModified': 'D:20070615171730', '/Category': 'Security Target', '/Title': 'eEye Digital Retina Enterprise Suite Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-07-0043', 'cert_item': 'Retina Enterprise Suite', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-07-0043': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2, 'EAL2': 2}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 12, 'EAL 2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP': 1, 'ACM_CAP.2': 13}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1, 'ADO_DEL.1': 6, 'ADO_IGS.1': 6}, 'ADV': {'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_RCR': 1, 'ADV_FSP.1': 9, 'ADV_HLD.1': 12, 'ADV_RCR.1': 5}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_ADM.1': 12, 'AGD_USR.1': 10}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 5, 'ATE_FUN.1': 10, 'ATE_IND.2': 8}, 'AVA': {'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_SOF.1': 7, 'AVA_VLA.1': 9}}, 'cc_sfr': {'FIA': {'FIA_ATD.1': 7, 'FIA_UAU.1': 8, 'FIA_UID.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.2': 5, 'FIA_UID.2': 6, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU': 2, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MTD.1': 9, 'FMT_SMF.1': 7, 'FMT_SMR.1': 8, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_RVM.1': 7, 'FPT_RVM.1.1': 1, 'FPT_SEP.1': 5, 'FPT_STM.1': 5, 'FPT_ITT.1': 5, 'FPT_ITT.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_RVM': 3}}, 'cc_claims': {'O': {'O.PROTECT': 10, 'O.NSSCAN': 9, 'O.NSSANLZ': 9, 'O.EADMIN': 4, 'O.ACCESS': 12, 'O.IDAUTH': 18, 'O.INTEGR': 9, 'O.CREDEN': 6, 'O.INSTAL': 5, 'O.INTROP': 6, 'O.PERSON': 8, 'O.PHYCAL': 6, 'O.OFLOWS': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.PRIVIL': 3, 'T.IMPCON': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALREC': 3, 'T.FALASC': 3}, 'A': {'A.ACCESS': 3, 'A.DYNMIC': 3, 'A.ASCOPE': 3, 'A.PROTECT': 3, 'A.SYSPROTECT': 3, 'A.TIME': 3, 'A.MANAGE': 3, 'A.NOEVIL': 4, 'A.NOTRST': 3}, 'OE': {'OE.AUTH_ACCESS': 9, 'OE.IDAUTH': 19, 'OE.SEP': 5, 'OE.TIME': 4, 'OE.AUTH_ACCES': 1}}, 'vendor': {'Microsoft': {'Microsoft': 5}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'NSS': {'NSS': 18}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10034-vr.pdf.
    • The st_filename property was set to st_vid10034-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-0043-2007.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10034-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10034-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "5b846a3e29e9e541",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-0043-2007",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.4.21.53",
        "2.2.0.194",
        "3.0.2.571"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Wireless Monitoring",
      "certification_date": "2007-05-25",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": null,
      "id": "CCEVS-VR-VID10034",
      "product": "eEye Retina Enterprise Suite, comprising the following eEye components:  Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10034",
      "vendor": "eEye Digital Security Corporation"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "eEye Digital Security Corporation",
  "manufacturer_web": "https://www.eeye.com/",
  "name": "eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194",
  "not_valid_after": "2012-09-06",
  "not_valid_before": "2007-05-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10034-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-07-0043",
        "cert_item": "Retina Enterprise Suite",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-07-0043": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 4
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Tony Apted",
      "/CreationDate": "D:20070615142322-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20070615142351-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20070615182254",
      "/Title": "Validation Report for eEye Retina Network Security Scanner",
      "pdf_file_size_bytes": 121865,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "st_vid10034-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ASCOPE": 3,
          "A.DYNMIC": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 4,
          "A.NOTRST": 3,
          "A.PROTECT": 3,
          "A.SYSPROTECT": 3,
          "A.TIME": 3
        },
        "O": {
          "O.ACCESS": 12,
          "O.CREDEN": 6,
          "O.EADMIN": 4,
          "O.IDAUTH": 18,
          "O.INSTAL": 5,
          "O.INTEGR": 9,
          "O.INTROP": 6,
          "O.NSSANLZ": 9,
          "O.NSSCAN": 9,
          "O.OFLOWS": 1,
          "O.PERSON": 8,
          "O.PHYCAL": 6,
          "O.PROTECT": 10
        },
        "OE": {
          "OE.AUTH_ACCES": 1,
          "OE.AUTH_ACCESS": 9,
          "OE.IDAUTH": 19,
          "OE.SEP": 5,
          "OE.TIME": 4
        },
        "T": {
          "T.COMDIS": 3,
          "T.COMINT": 3,
          "T.FALASC": 3,
          "T.FALREC": 3,
          "T.IMPCON": 3,
          "T.LOSSOF": 3,
          "T.PRIVIL": 3,
          "T.SCNCFG": 3,
          "T.SCNMLC": 3,
          "T.SCNVUL": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP": 1,
          "ACM_CAP.2": 13
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.1": 6,
          "ADO_IGS": 1,
          "ADO_IGS.1": 6
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 9,
          "ADV_HLD": 1,
          "ADV_HLD.1": 12,
          "ADV_RCR": 1,
          "ADV_RCR.1": 5
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 12,
          "AGD_USR": 1,
          "AGD_USR.1": 10
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 5,
          "ATE_FUN": 1,
          "ATE_FUN.1": 10,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_SOF": 1,
          "AVA_SOF.1": 7,
          "AVA_VLA": 1,
          "AVA_VLA.1": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 12
        }
      },
      "cc_sfr": {
        "FIA": {
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 5,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 9,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_RVM": 3,
          "FPT_RVM.1": 7,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 5,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 18
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "SAIC CCTL",
      "/Category": "Security Target",
      "/Company": "SAIC",
      "/CreationDate": "D:20070615131908-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/Keywords": "Security Target",
      "/Manager": "Julie Taylor",
      "/ModDate": "D:20070615132215-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20070615171730",
      "/Subject": "Security Target",
      "/Title": "eEye Digital Retina Enterprise Suite Security Target",
      "pdf_file_size_bytes": 433295,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10034-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10034-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bef753b821b483861fd030f54176d6d2fa845b780ea3e53fead45dc2b94a341a",
      "txt_hash": "ec7ff74aa5622f8e5e319916f94ed265138a64a88a25df764c68da6892d5e78b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "872049f1b73b230436adbf36d1f7b0090845e2236f80eb3f697b7b7ad2509817",
      "txt_hash": "e3f09d65ec6ce23c78edb797ba794529337c522708adbd09f36181fa0f1afe4d"
    }
  },
  "status": "archived"
}