The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
FIPS Compliant Infrastructure with Intel Wireless: Solution Brief
This document presents an overview of the Intel wireless product compliance with the Federal Information Processing Standard (FIPS), which is often required by U.S. Federal, state and local governments for products that implement security.
What is FPS?
The Federal Information Processing Standard (FIPS) 140 is a U.S. government computer security standard used to accredit cryptographic modules. FIPS 140 coordinates the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. FIPS 140-1 became a mandatory standard for the protection of sensitive data in 1994 and was superseded by FIPS 140-2 in 2001. The current version of the standard is FIPS-140-2.
Federal agencies, and state and local governments rely on cryptography to secure communications and protect information used in critical infrastructures, electronic commerce and other applications. Private sector organizations wanting to do business with the U.S. Federal Government must use FIPS validated network infrastructures and wireless clients to enable more secure use and communication for mobile devices and notebook computers utilizing Wi-Fi Alliance WPA2*/IEEE 802.11i* security. Because of the robust security offered by FIPS-compliance, companies in financial services, healthcare, education and manufacturing are also incorporating FIPS into their wireless network infrastructures.
At the core of all products offering cryptographic services is the cryptographic module. Cryptographic modules, which contain cryptographic algorithms, are used in products and systems to provide security services such as confidentiality, integrity, and authentication. Although cryptography is used to provide security, weaknesses such as poor design or weak algorithms can render the product insecure and place highly sensitive information at risk. Adequate testing and validation of the cryptographic module and its underlying cryptographic algorithms against established standards is essential to provide security assurance.
Read the full FIPS Compliant Infrastructure with Intel Wireless Solution Brief.
Demos how to identify the Intel® wireless adapter and driver version on a Windows* 7 machine.
Deliver richer experiences to more users and devices using 802.11ac Wi-Fi devices.
Demos how to identify the Intel® wireless adapter and driver version on a Windows* 8 machine.
Experience faster internet, reduced lag, and better speeds on more devices with Intel® Wireless-AC.
Best Buy explains how the 802.11ac offers faster connections and supports more devices on a router.