Important Update: Cohesity Products Knowledge Base Articles
All Cohesity Knowledge Base Articles are now managed via the Cohesity Support Portal: https://support.cohesity.com/s/searchunify. The Knowledge Base articles available here will not reflect the latest information or may no longer be accessible.
Description
This guide provides instructions on how to obtain the FIPS 140-2 certificate for encryption and algorithm used in Backup Exec (BE). The FIPS 140-2 certification is crucial for ensuring that the encryption and algorithms meet federal security standards, which is important for compliance and security assurance.
Question: How can I obtain the FIPS 140-2 certificate for the encryption and algorithm used in Backup Exec?
To obtain the FIPS 140-2 certificate for the encryption and algorithm used in Backup Exec, follow these steps:
Understand the Importance: The FIPS 140-2 certification ensures that the encryption and algorithms used in Backup Exec meet federal security standards. This is essential for compliance with various regulations and for ensuring the security of your data.
Access the Certificate: The FIPS 140-2 certificate for Backup Exec can be accessed through the following link: FIPS 140-2 Certificate
Verify the Certificate: Once you access the link, verify the details of the certificate to ensure it covers the encryption and algorithms used in your version of Backup Exec.
Documentation: Keep a copy of the certificate for your records and for any compliance audits that may require proof of FIPS 140-2 certification.
By following these steps, you can obtain and verify the FIPS 140-2 certificate for the encryption and algorithm used in Backup Exec, ensuring that your data security measures meet federal standards.