{"product_id":6005,"v_id":6005,"product_name":"TippingPoint UnityOne Version 1.2","certification_status":"Not Certified","certification_date":"2003-08-04T00:08:00Z","tech_type":"Wireless Monitoring","vendor_id":{"name":"TippingPoint Technologies, Inc.","website":"http://www.tippingpoint.com"},"vendor_poc":"Gary Swenson","vendor_phone":"512.681.8343","vendor_email":"gswenson@tippingpoint.com","assigned_lab":{"cctl_name":"Arca CCTL"},"product_description":"<p>The TOE is a TippingPoint Technologies intrusion detection system that monitors network data flows for inappropriate, incorrect, or anomalous activity. UnityOne TM performs the IDS functionality of a scanner, sensor and analyzer. It uses two detection techniques: static signatures and anomaly algorithms. Signatures are used to detect indications of known attacks. Anomaly algorithms detect types of attacks rather than known implementations of the attack.</p>\r\n<p>The TOE consists of the following logical components: the Network Discovery (ND), the Intrusion Protection System (IPS), the Local Security Manager (LSM), the Command Line Interface (CLI), the UnityOne&trade; OS (operating system), and the UnityOne&trade; hardware.</p>\r\n<p>The IPS and ND interact with each other through a central component, the Local Security Manager (LSM) agent. The two components report observed events to the LSM agent and the LSM agent takes action based upon the preconfigured administrative settings. The LSM agent also reports this information on the LSM console, through which the authorized administrator is able to monitor and review observed events.<strong> </strong></p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the TippingPointTM UnityOneTM Version 1.2 TOE meets the security requirements contained in the Security Target. The criteria against which the UnityOneTM Version 1.2 TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.1 and International Interpretations effective on July 31, 2003. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 1.0. Cable and Wireless determined that the evaluation assurance level (EAL) for the UnityOneTM Version 1.2 is EAL 2. The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target. The Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by Cable and Wireless. The evaluation was completed in August 2003. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-03-0045, dated 21 August 2003), prepared by CCEVS.</p>","environmental_strengths":"<p>N/A</p>","features":[]}