The Federal Information Processing Standard (FIPS) 140-2 is a U.S. and Canadian government standard that specifies security requirements for cryptographic modules. 

 

VMware has validated various cryptographic modules against the FIPS-140-2 standard.  The FIPS 140-2 standard specifies and validates the cryptographic and operational requirements for the modules within security systems that protect sensitive information.  These modules employ NIST-Approved security functions such as cryptographic algorithms, key sizes, key management and authentication techniques.

 

VMware FIPS-140 Validated Cryptographic Modules:

 

VMware Java JCE (Java Cryptographic Extension) Module:

 The VMware Java JCE (Java Cryptographic Extension) module is a versatile software library that implements FIPS-140-2 approved cryptographic services for VMware products and platforms.
View Certificate #2181 [ June 2014 ]
View Security Policy

 

VMware Kernel Cryptographic Module:

 The VMware Kernel Cryptographic Module is a flexible software library providing FIPS-140-2 approved cryptographic operations for VMware products and platforms.
View Certificate #2180 [ June 2014 ]
View Security Policy

 

VMware NSS Cryptographic Module:

 The VMware NSS Cryptographic Module is a software cryptographic library that provides FIPS 140-2 validated network security services to VMware products.
View Certificate #2155, [ April 2014 ]
View Security Policy

 

VMware Cryptographic Module:

 The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms.
View Certificate #2122, [ April 2014 ]
View Security Policy


PCoIP Cryptographic Module for VMware View™:

 The PCoIP Display Protocol with Horizon View 5.0 provides end users with secure access to virtual desktop, dramatic improvements in user experience and bandwidth optimization across the LAN and WAN for demanding environments.
View Certificate #1644 [ December 2011 ]

View Security Policy

 

VMware ACE Cryptographic Engine:

 The ACE Encryption Engine allows virtual machines to be encapsulated into files that can be saved, copied, and provisioned. VMware Software Cryptographic Implementation is the kernel implementation that enables the VMware ACE application to perform its cryptographic functions such as hashing, encryption, digital signing, etc.

View Certificate #859 [ November 2007 ]
View Security Policy

Sign up for Security Advisories

Enter your email address:




VMware Security Response Center

Stay informed about security issues and considerations for your virtual infrastructure.

Visit Security Response Center