This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 383-4-246 |
ID-One COSMO X Codes SAAAAR : 093363 + patch 099E71 ; 093364 + patchs 099441 et 099E21 ; 093366 ANSSI-CC-2023/06 |
|
---|---|---|
name | McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 | ID-One COSMO X Codes SAAAAR : 093363 + patch 099E71 ; 093364 + patchs 099441 et 099E21 ; 093366 |
category | Boundary Protection Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 27.11.2018 | 23.05.2028 |
not_valid_before | 27.11.2013 | 23.05.2023 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-246%20cert%20orig%20signedv%200.5e.doc | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_06fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-246%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_06fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-246%20ST%20v1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_06en.pdf |
manufacturer | McAfee, Inc. | Idemia |
manufacturer_web | https://www.mcafee.com/ | https://www.idemia.com |
security_level | EAL2+, ALC_FLR.2 | ALC_TAT.3, ALC_DVS.2, ATE_COV.3, EAL5+, ATE_FUN.2, ALC_CMC.5, ADV_TDS.5, ADV_INT.3, AVA_VAN.5, ALC_FLR.1, ADV_IMP.2 |
dgst | dc289e4aa08851ff | 6233b7fe7e291f87 |
heuristics/cert_id | 383-4-246 | ANSSI-CC-2023/06 |
heuristics/cert_lab | CANADA | [] |
heuristics/extracted_sars | ALC_CMC.2, ATE_COV.1, ALC_CMS.2, AVA_VAN.2, ADV_ARC.1, ATE_IND.2, AGD_OPE.1, ATE_FUN.1, ADV_FSP.2, ADV_TDS.1, ALC_FLR.2, AGD_PRE.1, ALC_DEL.1 | AGD_OPE.1, ATE_COV.3, ALC_DEL.1, ALC_FLR.1, ADV_TDS.5, ASE_INT.1, ADV_ARC.1, ALC_CMC.5, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ALC_COV.3, ALC_DVS.2, ASE_OBJ.2, ADV_IMP.2, ALC_CMS.5, ASE_CCL.1, ADV_INT.3, ATE_FUN.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ALC_TAT.3 |
heuristics/extracted_versions | 9.1 | 093364, 099441, 093363, 093366 |
heuristics/report_references/directly_referenced_by | {} | NSCIB-CC-2300063-01-CR, ANSSI-CC-2023/21, ANSSI-CC-2023/25, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/26, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/28, ANSSI-CC-2023/24, NSCIB-CC-2300050-01-CR |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-1107-V3-2022 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2023/50, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/48, ANSSI-CC-2023/27, NSCIB-CC-2300123-01-CR, NSCIB-CC-2300061-02-CR2, ANSSI-CC-2023/28, ANSSI-CC-2023/51, NSCIB-CC-2300063-02-CR2, ANSSI-CC-2023/25, NSCIB-CC-2300063-01-CR, ANSSI-CC-2023/21, NSCIB-CC-2300062-02-CR2, ANSSI-CC-2023/47, ANSSI-CC-2023/26, NSCIB-CC-2300061-01-CR, NSCIB-CC-2300050-01-CR, ANSSI-CC-2023/49, ANSSI-CC-2023/24 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-V3-2022 |
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2023/29, ANSSI-CC-2023/21, ANSSI-CC-2023/25, ANSSI-CC-2023/27, ANSSI-CC-2023/24, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/28 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-1107-V3-2022 |
heuristics/st_references/indirectly_referenced_by | {} | ANSSI-CC-2023/29, ANSSI-CC-2023/21, ANSSI-CC-2023/25, ANSSI-CC-2023/27, ANSSI-CC-2023/24, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/28 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-V3-2022 |
heuristics/protection_profiles | {} | 94167fd161e87d71 |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename | 383-4-246 cert orig signedv 0.5e.doc | certificat-CC-2023_06fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-246 CR v1.0e.pdf | ANSSI-CC-2023_06fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-246 ST v1.1.pdf | ANSSI-cible-2023_06en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_garbage | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |