Resources

Filters

Data Sheet

Coalfire DFARS NIST SP 800-171 compliance services

Maintain government contract award eligibility by demonstrating compliance with NIST SP 800-171 for Department of Defense (DoD) Federal Acquisition Regulations Supplement (DFARS) requirements.

  • Compliance

Data Sheet

Penetration testing - Exploiting vulnerabilities to prevent real attacks

By using sophisticated penetration tests, you can confidently secure your data and your customers’ data from evolving threats and continuous attacks. While mandated by compliance requirements, pen tests are also the best way to prove you’re prepared for a malicious attack.

  • Cybersecurity

Case Study

Global financial services leader chooses leading application security partner

FIS™ is a global leader in financial services technology, with a focus on retail and institutional banking, payments, asset and wealth management, risk and compliance, consulting, and outsourcing solutions. The company serves more than 20,000 clients and billions of transactions annually.

  • Application security

White Paper

FedRAMP® Agency ATO Route: What Does Sponsorship Entail?

Each stakeholder has a role in the two FedRAMP authorization routes: Joint Authorization Board (JAB) provisional route and Agency ATO route. This publication outlines those responsibilities specific to the government agency role.

  • Compliance
  • FedRAMP®

White Paper

System and Organization Controls (SOC) reports: Understanding the differences

System and Organization Controls (SOC) reports are recognized worldwide as a tool for organizations to help build trust in their security and controls posture. This guide outlines the various SOC reports currently available in the market to help you understand the purpose of each report type and how it benefits a particular audience.

  • Compliance

Webinar

Penetration testing fundamentals webinar

According to Verizon’s 2016 Data Breach investigation report 90% of breaches found, fall into one of ten classifications. All of the identified breaches that were within these classifications could have been prevented with threat advisory and penetration testing programs to evaluate their exposure to threats and vulnerabilities.

  • Cybersecurity