SOURCE: Applied Identity, Inc.

December 02, 2008 08:00 ET

Applied Identity Earns Common Criteria Certification to Meet Network Security Needs of Federal Government Organizations

ID-Enforce Gateway Achieves EAL 2 Security Certification

SAN FRANCISCO, CA--(Marketwire - December 2, 2008) - Applied Identity, Inc., a leader in identity-aware network solutions, today announced that its ID-Enforce™ product line is the industry's first Identity Access Gateway appliance certified to meet the Common Criteria for Information Technology Security Evaluation (CC) certification, at Evaluation Assurance Level 2 (EAL 2). Awarded on October 6, 2008, the Common Criteria certification serves as an independent, impartial security evaluation that verifies the functional reliability and security of the Applied Identity ID-Enforce products.

"This achievement demonstrates Applied Identity's commitment to meeting the strict security requirements of all commercial organizations, especially the United States government, and the protection of critical IT information assets," said Applied Identity's CTO Dean Weber. "As the first vendor in the market to achieve Common Criteria certification for an Identity Access Gateway, we continue to demonstrate leadership in this growing arena of identity-aware networking."

Common Criteria certification is the widest available mutual recognition of secure IT products, and is a key determining factor for government agencies when making IT purchasing decisions. Many other countries have adopted and recognize the Common Criteria certification, which allows organizations to purchase IT products with confidence and understanding that they meet widely accepted security standards.

"Meeting certain security and compliance requirements -- especially for our federal customers such as the Department of Justice -- are critically important," continued Weber. "Certifications such as Common Criteria provide government agencies and security-conscious commercial organizations with a higher level of reassurance, therefore decreasing the time to evaluate, deploy and implement an effective security solution."

"One problem with today's networks is that they treat everyone the same whether that person is an employee, guest, contractor or partner," said Lawrence Orans, Research Director at Gartner, Inc. "Organizations with potentially the most to lose, government agencies in particular, want another layer of protection that allows them to identify what individual users are doing on the network. With identity-aware networking, users can only access the applications they are authorized to access, and organizations can monitor and define access policies more granularly. The nature of identity-based tracking and auditing also makes identity-aware networking an excellent way for organizations to comply with regulations such as SOX, HIPAA and PCI."

The ID-Enforce 5000, 7000 and 10000 hardware appliances with ID-Enforce Gateway Version 3.3 including the ID-Enforce Client ID-Mark v3.3 and the Identisphere Manager (ID-Policy v3.3) achieved Common Criteria certification at Evaluation Assurance Level 2 (EAL 2).

About Applied Identity

Applied Identity is a leading provider of enterprise-class, identity aware network solutions that help organizations to simplify, consolidate, define and enforce network security policies to help demonstrate compliance and to reduce business risk.

Applied Identity allows organizations to:

--  Audit user and network resource activity based on user identity
--  Consolidate disparate identity data stores, policies and reporting
--  Create and define security policies based on User, Role, or Group
--  Enforce granular User, Role, or Group-based access policies at the
    network level
--  Manage ongoing Return on Investment (ROI) and reduce Total Cost of
    Ownership (TCO) associated with securing critical network resources within
    identity aware network environments

Founded in 2004, Applied Identity's Identisphere™ solutions products are low-touch appliances that can be rapidly deployed and seamlessly integrated into the existing network infrastructure. For more information, visit

Product and company names and design marks herein are trademarks of their respective owners.

Contact Information

  • PR Contact:
    Rebekah Mitchell
    Applied Identity
    Email Contact