SecureVue v3.6.3 CP1

CSV information

Status archived
Valid from 20.05.2013
Valid until 20.05.2015
Scheme 🇺🇸 US
Manufacturer EiQ Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary

Certificate ID: CCEVS-VR-VID-10379-2013

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES, HMAC-SHA-256
Protocols
SSH, SSL, TLS
Libraries
OpenSSL

Vendor
Microsoft, Cisco

Security level
EAL 2, EAL2, EAL 3, EAL 2 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.2, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU_EXP.2, FIA_UAU.5, FIA_UAU.7, FIA_UID.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPT_ITT_EXP.1, FPT_TST_EXP.1
Certificates
CCEVS-VR-VID10379-2013

Certification process
out of scope, both of which are out of scope, operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the, resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered

Standards
FIPS 140-2

File metadata

Creation date D:20130528143513
Modification date D:20130528143513
Pages 40
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10379-2013
Certified item SecureVue, Version 3.6.3 CP1
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256
Hash functions
SHA-256
Protocols
SSH, SSL, TLS
Randomness
RNG
Libraries
OpenSSL

Vendor
Microsoft, Cisco

Security level
EAL2, EAL 2, EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2 augmented, EAL 2 augmented
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU_EXP.2, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.2, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU_EXP.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.2.1, FIA_AFL, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT_EXP.1, FPT_TST_EXP.1, FPT_ITT, FPT_ITT_EXP.1.1, FPT_ITT_EXP.1.2, FPT_TST, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST_EXP.1.3, FPT_STM.1, FTP_ITC, FTP_ITT.1, FTP_TST_EXP.1, FTP_ITT_EXP.1

Certification process
out of scope, UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe, both of which are out of scope, A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1, Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication, Data Collector Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered, operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is

Standards
FIPS 140-2, RFC 5424, RFC 3080, RFC 2865, RFC 4251, RFC 959

File metadata

Creation date D:20130528143443
Modification date D:20130528143443
Pages 73
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10379-2013

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data

Product SecureVue v3.6.3 CP1
Id CCEVS-VR-VID10379
Url https://www.niap-ccevs.org/products/10379
Api Url https://www.niap-ccevs.org/api/project/product/pcl_products/10379/
Certification Date 20.05.2013
Expiration Date 20.05.2015
Category Enterprise Security Management
Categories ['Enterprise Security Management', ' Network Management']
Vendor EiQ Networks, Inc.
Evaluation Facility CygnaCom Solutions, Inc
Scheme US

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "78bafa65426e3c35",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10379-2013",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.6.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10379/",
      "categories": [
        "Enterprise Security Management",
        " Network Management"
      ],
      "category": "Enterprise Security Management",
      "certification_date": "2013-05-20",
      "evaluation_facility": "CygnaCom Solutions, Inc",
      "expiration_date": "2015-05-20",
      "id": "CCEVS-VR-VID10379",
      "product": "SecureVue v3.6.3 CP1",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/products/10379",
      "vendor": "EiQ Networks, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "EiQ Networks, Inc.",
  "manufacturer_web": "https://www.EiQNetworks.com/",
  "name": "SecureVue v3.6.3 CP1",
  "not_valid_after": "2015-05-20",
  "not_valid_before": "2013-05-20",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10379-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10379-2013",
        "cert_item": "SecureVue, Version 3.6.3 CP1",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10379-2013": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 2,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 5
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 8,
          "EAL 2 augmented": 2,
          "EAL 3": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SAR.1": 3,
          "FAU_SAR.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.7": 1,
          "FIA_UAU_EXP.2": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_ITT_EXP.1": 3,
          "FPT_TST_EXP.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "both of which are out of scope": 1,
          "operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the": 1,
          "out of scope": 2,
          "resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope  High availability option  Data Collector Configuration (DCConf.exe)  Distributed and tiered": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 3
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        },
        "TLS": {
          "SSL": {
            "SSL": 5
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 2
        },
        "Microsoft": {
          "Microsoft": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20130528143513",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130528143513",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 436203,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cygnacom.com/",
          "http://www.niap-ccevs.org/",
          "http://www.niap-ccevs.org/cc-scheme"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "st_vid10379-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 4,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL 4": 1,
          "EAL1": 1,
          "EAL2": 6,
          "EAL2 augmented": 4,
          "EAL3": 1,
          "EAL5": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 14,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 11,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 8,
          "FAU_SAR.3.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 13,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 14,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 9,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 6,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 10,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXP.2": 17,
          "FIA_UAU_EXP.2.1": 2,
          "FIA_UID.1": 8,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_ITT_EXP.1": 14,
          "FPT_ITT_EXP.1.1": 2,
          "FPT_ITT_EXP.1.2": 2,
          "FPT_STM.1": 2,
          "FPT_TST": 2,
          "FPT_TST_EXP.1": 13,
          "FPT_TST_EXP.1.1": 2,
          "FPT_TST_EXP.1.2": 2,
          "FPT_TST_EXP.1.3": 2
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITT.1": 1,
          "FTP_ITT_EXP.1": 1,
          "FTP_TST_EXP.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " Data Collector  Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope  High availability option  Data Collector Configuration (DCConf.exe)  Distributed and tiered": 1,
          "A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1": 1,
          "Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication": 1,
          "UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope  High availability option  Data Collector Configuration (DCConf.exe": 1,
          "both of which are out of scope": 1,
          "operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is": 1,
          "out of scope": 4
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 9
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 9
        },
        "TLS": {
          "SSL": {
            "SSL": 5
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 9
        },
        "RFC": {
          "RFC 2865": 1,
          "RFC 3080": 1,
          "RFC 4251": 2,
          "RFC 5424": 2,
          "RFC 959": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 3
        },
        "Microsoft": {
          "Microsoft": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20130528143443",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130528143443",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 996645,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.eiqnetworks.com/products/SecureVue/End_to_End_Correlation.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Performance_Analytics.shtml",
          "../../AppData/Local/Microsoft/Windows/Users/hmarkle/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/Users/hmarkle/AppData/Roaming/Microsoft/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/Program%20Files/NIAP/CC%20Toolbox%206/Data/Docs/CCManual/PART2/Part27-4-1.htm",
          "http://www.eiqnetworks.com/products/SecureVue/Regulations.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Configuration_Analytics.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/NBAD_NetFlow.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Control_Frameworks.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Vulnerability_Analytics.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Asset_Analytics.shtml",
          "http://www.eiqnetworks.com/products/SecureVue/Log_Management.shtml"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 73
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2a82ca66cec15be9b32d1ff0f0beb9936492e538c45c9d1df97ab830aef0a26b",
      "txt_hash": "babe39788f835463fe1a1d0fd2dcbf896fe94dcd1027a4855d1f446e2a643669"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2156b87c18b64cfdcfd42ebace580de50ae9e50d00a147f27ea2eca67d47b6cd",
      "txt_hash": "6f58b5c653264f8ddf483080d5be9e4663ce8fca19b0bcb6ce4a5c1d3f51771c"
    }
  },
  "status": "archived"
}