Federal Information Processing Standards (FIPS)

The Federal Information Processing Standard (FIPS) 140-2 is a U.S. and Canadian government standard that specifies security requirements for cryptographic modules. 

 

VMware has validated various cryptographic modules against the FIPS-140-2 standard.  The FIPS 140-2 standard specifies and validates the cryptographic and operational requirements for the modules within security systems that protect sensitive information.  These modules employ NIST-Approved security functions such as cryptographic algorithms, key sizes, key management and authentication techniques.

 

VMware FIPS-140 Validated Cryptographic Modules:

 

VMware Java Cryptographic Extension (JCE) Modules

The VMware JCE (Java Cryptographic Extension) Modules are a versatile software library that implements FIPS-140-2 Approved cryptographic services for VMware products and platforms.

 

VMware Horizon JCE (Java Cryptographic Extension) Module:

View Certificate #2559 [ February 2016 ]
View Security Policy PDF  

 

VMware Java JCE (Java Cryptographic Extension) Module:

View Certificate #2181 [ June 2014 ]
View Security Policy PDF

 

VMware Kernel Cryptographic Module:

 The VMware Kernel Cryptographic Module is a flexible software library providing FIPS-140-2 approved cryptographic operations for VMware products and platforms.
View Certificate #2180 [ June 2014 ]
View Security Policy
PDF

 

VMware NSS Cryptographic Module:

 The VMware NSS Cryptographic Module is a software cryptographic library that provides FIPS 140-2 validated network security services to VMware products.
View Certificate #2155, [ April 2014 ]
View Security Policy PDF

 

VMware Cryptographic Module:

 The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms.
View Certificate #2122, [ April 2014 ]
View Security Policy PDF


PCoIP Cryptographic Module for VMware View™:

 The PCoIP Display Protocol with Horizon View 5.0 provides end users with secure access to virtual desktop, dramatic improvements in user experience and bandwidth optimization across the LAN and WAN for demanding environments.
View Certificate #1644 [ December 2011 ]

View Security Policy
PDF

     

    VMware ACE Cryptographic Engine:

    The PCoIP display protocol with Horizon (with View)™ 5.0 provides end users with secure access to virtual desktops, dramatic improvements in user experience and bandwidth optimization across the LAN and WAN for demanding environments. - See more at: http://iwov-prod-preview-2.vmware.com/preview/100406?areavpath=/templatedata/content/generic/data/pages/security/fips#sthash.83kftbwF.dpuf

     The ACE Encryption Engine allows virtual machines to be encapsulated into files that can be saved, copied, and provisioned. VMware Software Cryptographic Implementation is the kernel implementation that enables the VMware ACE application to perform its cryptographic functions such as hashing, encryption, digital signing, etc.

    View Certificate #859 [ November 2007 ]
    View Security Policy PDF