Achieving FIPS 140-2 Encryption Compliance with HAProxy Enterprise on Red Hat Enterprise Linux
Encryption is an important facet of cybersecurity. It involves scrambling messages so that they can not be read by unauthorized parties in order to protect private information, which is particularly important when sending data across an untrusted network or the Internet, where criminals often try to intercept it. As important as encryption is, its effectiveness can degrade as researchers discover weaknesses in the underlying encryption algorithms.
FIPS 140-2 is a U.S. government standard that regulates which encryption algorithms federal agencies may use. It seeks to safeguard data by retiring weak algorithms from its approved list. While government agencies and contractors must follow this standard, organizations in other industries have also adopted it to ensure data security of patient records, financial documents, and the like.
In this webinar, you will learn how FIPS 140-2 is designed to protect data, how it relates to using TLS encryption, and how you can become compliant when using the HAProxy Enterprise load balancer on Red Hat Enterprise Linux. You will also show how you can use HAProxy Enterprise to connect to the AWS CloudHSM.
Speakers
Watch the webinar
The webinar video will appear on this page after the form submission