Software House Achieves FIPS 197 Validation for Entire iSTAR Controller Family

Software House Achieves FIPS 197 Validation for Entire iSTAR Controller Family

Software House Achieves FIPS 197 Validation for Entire iSTAR Controller FamilySoftware House, part of the security products business unit of Tyco, has announced that it has attained the U.S. Government’s Federal Information Processing Standards (FIPS) 197 validation for its complete iSTAR physical access controller family, including iSTAR Edge, iSTAR Pro, iSTAR eX, and soon-to-be-released iSTAR Ultra.    

FIPS 197 is the government’s standard for the AES (Advanced Encryption Standard) encryption algorithm for electronic data.  It is the preferred cryptographic method utilized by U.S. government agencies due to its high-level of cryptographic, key strength.

The FIPS 197 validation is based on the implementation of the C•CURE Cryptographic Engine v2.0, utilized by Software House, to provide cryptographic services within the iSTAR controllers as well as the C•CURE 9000 security and event management system. C•CURE 9000 is a highly-scalable security and event management platform, allowing users to meet access control and security needs from entry to enterprise level.

“Our latest FIPS 197 validation demonstrates our commitment to providing the industry’s highest levels of encryption across our entire product line” said Rick Focke, senior product manager for Software House.  “Now all iSTAR network controllers, from our single-reader iSTAR Edge up to a 16-reader iSTAR Pro or iSTAR Ultra, can communicate peer-to-peer in an encrypted manner, even when offline from the host.”

The FIPS 197 standard is a joint effort by the National Institute of Standards and Technology (NIST) in the United States and the Communications Security Establishment Canada (CSEC) under the Canadian government. The standard provides third-party assurance of security claims on any product containing cryptography that may be purchased by a government agency.

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.