This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Dell EMC™ Data Domain® v7.2 566-EWA |
Symantec™ Endpoint Protection Version 11.0 383-4-84 |
|
|---|---|---|
| name | Dell EMC™ Data Domain® v7.2 | Symantec™ Endpoint Protection Version 11.0 |
| category | Other Devices and Systems | Detection Devices and Systems |
| status | active | archived |
| not_valid_after | 27.09.2027 | 29.09.2015 |
| not_valid_before | 26.09.2022 | 25.06.2008 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CT%20v1.0.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-cert-e.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20ST%20v1.17.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-sec-e.pdf |
| manufacturer | Dell EMC | Symantec Corporation |
| manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.symantec.com |
| security_level | EAL2+, ALC_FLR.2 | AVA_MSU.1, EAL2+, ALC_FLR.2 |
| dgst | eddcd1da185327cf | 0d1b1dccbbd49d84 |
| heuristics/cert_id | 566-EWA | 383-4-84 |
| heuristics/cpe_matches | {} | cpe:2.3:a:symantec:endpoint_protection:11.0.7.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7.3:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:* |
| heuristics/related_cves | {} | CVE-2013-5011, CVE-2019-12758, CVE-2020-5834, CVE-2013-5015, CVE-2010-3268, CVE-2012-4348, CVE-2012-1443, CVE-2020-5820, CVE-2019-12756, CVE-2020-5821, CVE-2012-1459, CVE-2018-5237, CVE-2012-1446, CVE-2016-5311, CVE-2018-5236, CVE-2014-9227, CVE-2020-5837, CVE-2020-5822, CVE-2013-5014, CVE-2020-5833, CVE-2019-12757, CVE-2020-5829, CVE-2011-0551, CVE-2012-0289, CVE-2010-0108, CVE-2012-1421, CVE-2012-1461, CVE-2009-1428, CVE-2009-1429, CVE-2014-3437, CVE-2020-5836, CVE-2012-1456, CVE-2014-3434, CVE-2020-5831, CVE-2012-1457, CVE-2010-0114, CVE-2018-12239, CVE-2019-12750, CVE-2018-12245, CVE-2014-9228, CVE-2014-9229, CVE-2014-3438, CVE-2017-6331, CVE-2020-5823, CVE-2009-1430, CVE-2012-1462, CVE-2020-5826, CVE-2020-5824, CVE-2009-1431, CVE-2016-9094, CVE-2011-0550, CVE-2018-18368, CVE-2016-9093, CVE-2014-3439, CVE-2020-5835, CVE-2020-5827, CVE-2015-8113, CVE-2018-12238, CVE-2010-0106, CVE-2020-5828, CVE-2013-5010, CVE-2019-12759, CVE-2019-18372, CVE-2009-1432, CVE-2013-5009, CVE-2020-5830, CVE-2020-5825, CVE-2012-4953, CVE-2012-1425 |
| heuristics/extracted_sars | ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 | AVA_VLA.1, ADV_HLD.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ALC_FLR.2, ADV_RCR.1, ATE_COV.1, AVA_SOF.1, ATE_FUN.1, AGD_USR.1, ADV_FSP.1 |
| heuristics/extracted_versions | 7.2 | 11.0 |
| heuristics/scheme_data |
|
|
| pdf_data/cert_filename | 566-EWA CT v1.0.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 566-EWA CR v1.0.pdf | sepv110-cert-e.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | 566-EWA ST v1.17.pdf | sepv110-sec-e.pdf |
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |