About us

Compliance Labs is the world’s premier directory for software solutions that support cybersecurity regulations, standards, and best practices. We deliver the insights clients need to choose software that supports their compliance requirements and enhances risk reduction.

Our Software Compliance Testing service assesses and tests vendors’ software solutions to ensure they align with cybersecurity regulations, standards, and best practices. After thorough evaluation, we feature these solutions on our website, providing companies with objective insights into which software vendors can effectively support regulatory compliance requirements and client best practices.

About Compliance Labs: Pioneering Regulatory Compliance Solutions

Why Compliance Labs

Organizations of all sizes use software solutions to meet cybersecurity regulations and standards compliance for critical business functions. While sensitive data processes and services can be outsourced, the responsibility for non-compliance remains with the organization. Effectively managing risk and adapting to evolving regulatory requirements requires a careful evaluation of compliance with the controls established by software vendors.

There are many sources of information on software vendors and regulatory compliance requirements, but most are limited to marketing materials and analyst reviews, which primarily focus on aligning software functionalities with regulatory compliance requirements. However, organizations are also seeking software vendors that can actively support their unique compliance needs, as well as guidance on implementing and maintaining these solutions. Many lack the resources, time, and budget to thoroughly assess regulatory requirements, best practices, or to test the software themselves.

Compliance Labs_values-compliance-labs_picto

Our values

Compliance Labs_values-compliance-labs_picto2

Unwavering Expertise

At Compliance Labs, we pride ourselves on our deep expertise in regulatory compliance. Our team comprises seasoned professionals with extensive knowledge across diverse sectors, enabling us to navigate the complexities of regulatory mandates and anticipate the industry's evolving needs. This expertise positions us as a trusted leader in the field.

Compliance Labs_values-compliance-labs_picto3

Comprehensive Guidance

Guidance is more than just offering advice; it’s about providing a clear roadmap for success. At Compliance Labs, we are dedicated to supporting our clients every step of the way. From understanding their unique compliance challenges to recommending tailored solutions, our guidance is comprehensive, empowering businesses to navigate the complex compliance landscape with confidence and precision.

Compliance Labs_values-compliance-labs_picto4

Client-Centric Approach

Our clients are at the core of everything we do. We believe in building lasting partnerships, understanding their unique needs, and offering solutions that align with their specific compliance goals. Our client-centric approach ensures we deliver not only solutions but a strategic partnership that empowers businesses to thrive in a regulated environment.

The team

Abdelbaset Latreche,

Analyst & Founder

Abdelbaset brings 25 years of experience in IT/OT cybersecurity, compliance, and risk management, specializing in NERC CIP, ISA/IEC 62443, NIST SP 800-53, PCI DSS, and NIST CSF assessments and remediation. Before founding Compliance Labs, he served as Head of Security Consulting at HP Enterprise Security Services, Security Consulting Practice Leader at IBM, and EMEA Practice Leader at Verizon.

In critical infrastructure, Abdelbaset assessed and implemented cybersecurity processes for Industrial Automation Control Systems (IACS) in line with ISA95 and ISA/IEC 62443 standards. He established ICS frameworks for SAT/FAT cybersecurity testing and developed risk management methodologies based on international standards.

In the financial and payment sectors, Abdelbaset developed methodologies for risk and fraud services, payment scheme risk management programs, and conducted assessments for merchants, acquirers, issuers, vendors, and service providers worldwide.

Abdelbaset holds a Master’s in Information Systems Management/Extended Enterprise from Paris-Dauphine University and certifications including GCIP, CISSP, and ISO 27001 Lead Auditor.

Jeso Sothilingam,

Contributing Analyst

Jeso is a seasoned professional with a diverse background in the tech industry. Currently serving as a Contributing Analyst at our organization, he brings extensive experience in IT/OT cybersecurity assessments and remediation.

Jeso’s academic foundation includes studies at Grenoble School of Management and ECE TECH. Holding a Master’s in IT and Digital Management and a Bachelor’s in Systems and Network Security Management, his educational credentials reflect his deep expertise and commitment to the field.

Didier Godart,

Contributing Analyst

Didier is a highly effective professional with 25 years of international experience in information security, auditing, risk management, compliance processes, business development, and project and program management. Dynamic, self-motivated, and results-oriented, he is both a team leader and team player with the ability to work autonomously and a proven track record of driving and delivering complex projects in large corporate environments through effective internal and external communication.

Didier brings his expertise and personal skills to organizations that foster a trusted atmosphere, aligning with his commitment to excellence.

Contact us today

We are here to help you find the right software solutions to grow your business and achieve your goals.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Software logo
  • Vendor
  • What is this Software?
  • Website
  • Cybersecurity Regulations, Standards and Guidelines Tested
  • Other Cybersecurity Regulations, Standards and Guidelines Supported
  • Deployment
  • Environment
  • Region
  • Industry
  • Capabilities
  • Application and DevOps Security
  • Asset Inventory and Management
  • Audit and Compliance Management
  • Awareness and Training
  • Backup and Recovery
  • Data Security
  • Endpoint and Device Protection
  • Identity Management and Access Control
  • Incident Response
  • Logging and Threat Detection
  • Network security
  • Posture and Vulnerability Management
  • Risk Assessment and Management
  • Software Bill Of Materials (SBOM)
  • Zero Trust Network Access
  • DORA Requirements Supported by the Software
  • HIPAA Requirements Supported by the Software
  • MITRE Mitigations Enterprise Supported by the Software
  • ISO/IEC 27001 Requirements Supported by the Software
  • NERC CIP Requirements Supported by the Software
  • NIST CSF Controls Supported by the Software
  • NIST SP6800-53 (LOW) Controls Supported by the Software
  • NIST SSDF Controls Supported by the Software
  • PCI DSS Requirements Supported by the Software
  • Scope Impact
  • Periodic compliance activities supported by the Software
  • The Software store, process, or transmit
  • The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
  • Software modules implemented
  • Software vendor Third-Party Service Providers (TPSPs) used
  • Software NERC CIP scoping
  • Software NIST SSDF scoping
  • Software PCI DSS scoping
Compare
Compare ×
View comparison Continue browsing software