Skip to content
Compliance Labs logo

Compliance Services for Customers & Vendors | Compliance Labs

  • By Regulations & Standards
    • DORAWhat is Dora?
      • Identify the appropriate software solution for your DORA compliance needs. DORA aims to strengthen the digital operational resilience of the EU financial sector by targeting 21 types of entities. Key requirements include robust ICT risk management, incident reporting, resilience testing (TLPT for some), and third-party risk management, with an information register. DORA also establishes oversight for critical ICT service providers (CTPP).

    • HIPAA1. What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal legislation that set forth national standards to safeguard sensitive patient health information from unauthorized disclosure without the patient’s knowledge or consent. The HIPAA regulation consists of four rules: 1. Privacy Rule The Privacy Rule is designed to guarantee that entities handling health information implement appropriate measures to safeguard the information from unauthorized access or disclosure.Empower individuals with the knowledge and control over how their health information is utilized. Adherence to the Privacy Rule assures individuals seeking healthcare that an organization is dedicated to preserving the confidentiality and security of their information. Even if individuals are not interacting directly with an organization, they can trust the HIPAA framework to maintain the privacy of their data across all involved parties. 2. Security Rule The Security Rule is focused on protecting a specific subset of information encompassed by the Privacy Rule by establishing standards for the protection of electronically stored and transmitted PHI (ePHI). This is achieved by mandating the implementation of administrative, technical, and physical safeguards. Compliance with the Security Rule signifies an organization’s dedication to safeguarding the confidentiality, integrity, and security of ePHI, and…
      • Find the right software for your HIPAA compliance needs by comparing software capabilities, covered requirements, compliance impact, and the level of evidence the software supports. The HIPAA (Health Insurance Portability and Accountability Act of 1996) is a U.S. law that mandates national standards for protecting sensitive patient health information, known as protected health information (PHI).

    • NERC CIP1. What is NERC CIP? NERC CIP, which stands for North American Electric Reliability Corporation Critical Infrastructure Protection, is a collection of cybersecurity standards devised to safeguard the vital infrastructure of the North American electric grid. The objective of NERC CIP standards is to guarantee the reliability, security, and resilience of the electric power system by setting requirements for the identification and protection of critical assets and confidential information. Below is a summary of the NERC CIP framework: CIP-002: Critical Cyber Assets Identification: This requirement is centered on the identification and categorization of critical cyber assets within an organization’s control systems that are essential for the reliable operation of large-scale energy systems. CIP-003: Security Management Controls: This requirement is centered on the implementation of security management controls to establish and maintain an effective cybersecurity program. This encompasses the development of policies, conducting risk assessments, and implementing security controls. CIP-004: Personnel and Training: This requirement underscores the significance of qualified personnel and appropriate training to support an organization’s cybersecurity initiatives. CIP-005: Electronic Security Perimeter: This requirement is centered on establishing secure electronic access points or security perimeters to shield critical cyber assets from unauthorized access and cyber threats. CIP-006: Physical Security…
      • Select the best software solution for your NERC CIP compliance. Compare software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) is a set of cybersecurity standards designed to protect the critical infrastructure of the North American electric grid.

    • PCI DSS1. What is PCI DSS? Companies that store, process or transmit cardholder data are required to comply with the Payment Card Industry Data Security Standard (PCI DSS). This standard defined by the Payment Card Industry Security Standards Council (PCI SSC) specifies technical and operational requirements established to protect cardholder data, in-scope data includes the sensitive authentication data (stored on magnetic stripe data or equivalent on a chip, CVC2, CVV2, CID, PINs, PIN blocks) and the primary account number (PAN). The PCI SSC is responsible for managing the security standards, while compliance with the PCI set of standards is enforced by the founding members of the Council, American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Companies must undergo an annual security audit and quarterly network scan by PCI SSC approved providers. Not complying with the PCI DSS standard could lead to fines of non-compliance up to $500,000, expensive litigation costs, and being barred from cardholder data processing from card schemes. Furthermore, non-compliance has a direct impact on brand reputation and exposes companies to negative publicity that damages consumer confidence. The PCI DSS is composed of 12 requirements, organized into six control objectives: Build and Maintain a Secure…
      • Choose the appropriate software solution for your PCI DSS compliance. Evaluate software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. PCI DSS (Payment Card Industry Data Security Standard) specifies technical and operational requirements established to protect cardholder data, in-scope data includes the sensitive authentication data and the primary account number (PAN).

    • Browse all
  • By Frameworks
    • MITRE ATT&CK®1. What is MITRE ATT&CK? The MITRE ATT&CK is a comprehensive cybersecurity knowledge base of adversary tactics and techniques, grounded in actual real-world observations. This knowledge base provides a standardized approach to understanding, categorizing, and analyzing cyber threats and attack techniques. The MITRE ATT&CK was developed by MITRE, a nonprofit entity, established to offer engineering and technical advice to the federal government. The MITRE ATT&CK focuses on adversary behavior and provides insights into how cyber threats operate, their tactics, techniques, and procedures (TTPs), and the different stages of a cyber-attack. It is widely used in the cybersecurity industry and is valuable for organizations seeking to enhance their threat detection, incident response, and overall cybersecurity defenses. MITRE ATT&CK consists of a matrix that categorizes cyber threats based on the different stages of an attack, known as the “ATT&CK Matrix.” It includes the following components: Tactics: The high-level objectives that adversaries aim to achieve during a cyber-attack. These tactics include initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, exfiltration, and impact. Techniques: The specific methods and techniques used by adversaries to accomplish their objectives within each tactic. These techniques describe the step-by-step actions and procedures employed…
      • Select the appropriate software solution for MITRE ATT&CK mitigations by comparing software capabilities and covered mitigations supported by the software. MITRE ATT&CK is a comprehensive cybersecurity knowledge base of adversary tactics and techniques, based on real-world observations.

    • NIST CSF1. What is NIST CSF? The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized and widely adopted framework that provides a set of guidelines, best practices, and standards for improving cybersecurity risk management. The framework is specifically designed to help organizations, including critical infrastructure sectors, identify, protect, detect, respond to, and recover from cyber threats and incidents. The NIST CSF is based on industry standards and best practices, and it is a voluntary framework that organizations can adopt and tailor to their specific needs and risk profiles. It consists of three main components: Core: The Core is the heart of the framework and provides a set of cybersecurity activities and desired outcomes. It is organized into five key functions: Identify: This function involves understanding and managing cybersecurity risks by identifying critical assets, assessing vulnerabilities, and understanding the potential impact of cyber threats. Protect: The Protect function focuses on implementing safeguards to ensure the security and resilience of critical infrastructure. It includes activities such as access control, awareness training, data protection, and secure configurations. Detect: The Detect function involves continuous monitoring and timely detection of cybersecurity events. It includes activities such as threat intelligence, anomaly…
      • Find the right software solution for NIST CSF guidance by comparing software capabilities and covered guidance supported by the software. The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary guidance document intended to assist organizations in managing and mitigating cybersecurity risks. The framework is specifically designed to help organizations, including critical infrastructure sectors, identify, protect, detect, respond to, and recover from cyber threats and incidents.

    • NIST SP 800-53 (LOW)1. What is NIST SP800-53? The National Institute of Standards and Technology (NIST) Special Publication 800-53 (SP800-53) is a comprehensive cybersecurity framework that provides guidelines and controls for federal information systems and organizations. While it is not specifically focused on critical infrastructure, it serves as a valuable resource for enhancing cybersecurity practices in critical infrastructure sectors. NIST SP800-53 covers a wide range of security controls and best practices that organizations can implement to protect their information systems from various cyber threats. The framework is organized into 18 control families, each addressing a specific area of cybersecurity. Some of the key control families include: Access Control (AC): Controls related to granting and managing access to information systems and resources. This includes user identification, authentication, authorization, and accountability. Incident Response (IR): Controls focused on detecting, responding to, and recovering from cybersecurity incidents. It includes incident response planning, incident handling, and communication protocols. Configuration Management (CM): Controls related to establishing and maintaining secure configurations for information systems. This includes configuration baselines, change management processes, and configuration monitoring. System and Information Integrity (SI): Controls aimed at ensuring the integrity of information systems and data. This includes malware protection, security event monitoring, and vulnerability scanning.…
      • Select the appropriate software solution for NIST SP 800-53 (LOW) control baseline by comparing software capabilities and covered controls supported by the software. The NIST SP 800-53 (LOW: Low-Impact Systems) is a comprehensive cybersecurity framework that provides guidelines and controls for federal information systems and organizations. While it is not specifically focused on critical infrastructure, it serves as a valuable resource for enhancing cybersecurity practices in critical infrastructure sectors.

    • NIST SSDF1. What is NIST SSDF? The NIST SSDF (Secure Software Development Framework) is a cybersecurity framework developed by the National Institute of Standards and Technology (NIST) to help organizations secure their software development processes. The framework provides guidelines and best practices to integrate security into every phase of the software development life cycle (SDLC), from design to deployment and maintenance. The NIST SSDF Framework consists of a set of core principles and practices aimed at ensuring the development of secure and resilient software. It emphasizes the importance of proactive security measures and risk management throughout the entire software development process. Key components of the NIST SSDF Framework include: Risk Assessment: The framework emphasizes the need for conducting risk assessments early in the software development life cycle. This involves identifying potential security risks and vulnerabilities and analyzing their potential impact on the software and the overall system. Security Requirements: The NIST SSDF Framework promotes the inclusion of security requirements in the software development process. These requirements are defined based on the identified risks and help guide the development team in implementing appropriate security controls. Secure Design: The framework emphasizes the importance of secure design principles in developing resilient software. This involves…
      • Choose the appropriate software solution for NIST SSDF practices by comparing software capabilities and covered practices supported by the software. The NIST SSDF (Secure Software Development Framework) is a cybersecurity framework developed by the NIST to help organizations secure their software development processes. The framework provides guidelines and best practices to integrate security into every phase of the software development life cycle (SDLC), from design to deployment and maintenance.

    • Browse all
  • Services
    • Compliance for Software
      • PCI DSS
      • NERC CIP
      • NIST CSF
      • Evaluate your software’s capabilities that support PCI DSS compliance

      • Assess your software’s features that help organizations achieve NERC CIP compliance

      • Review your software’s features that align with NIST CSF best practices

      • NIST SSDF
      • ISO/IEC 27001
      • HIPAA
      • Evaluate your software’s features that help organizations meet NIST SSDF practices

      • Assess your software’s features supporting ISO/IEC 27001 compliance

      • Evaluate your software’s features that help organizations meet HIPAA compliance

      • Browse all
    • Strategy and Risk
      • Strategy and Risk consulting services assist critical infrastructure organizations in identifying, assessing, and mitigating potential risks through a structured approach. This enables businesses to align cybersecurity with their objectives while safeguarding assets and reputation

    • Cybersecurity for OT
      • Cybersecurity consulting services for OT known as Operational Technology (OT), focuses on safeguarding Industrial Control Systems (ICS) that oversee critical industrial processes. These systems, including SCADA, DCS, PLCs, HMIs, and sensors, are essential in various sectors, from power generation to manufacturing and transportation

  • Resources
    • Latest News
      • Stay up to date with the latest cybersecurity regulations, standards, frameworks, and industry best practices.

    • Blog
      • Receive updates and practical insights on the implementation of cybersecurity regulations, standards, requirements, frameworks, and best practices.

    • Reports
      • Reports and research on emerging cybersecurity frameworks, guidelines, regulations, and industry best practices to provide a comprehensive understanding of the evolving cybersecurity landscape.

    • Data Sheets
      • Learn how organizations improve compliance with cybersecurity regulations, standards, frameworks, and best practices through our services.

    • White Papers
      • Access white papers on cybersecurity regulations, standards, requirements, frameworks, and best practices.

  • About
  • FAQ
  • By Regulations & Standards
    • DORAWhat is Dora?
      • Identify the appropriate software solution for your DORA compliance needs. DORA aims to strengthen the digital operational resilience of the EU financial sector by targeting 21 types of entities. Key requirements include robust ICT risk management, incident reporting, resilience testing (TLPT for some), and third-party risk management, with an information register. DORA also establishes oversight for critical ICT service providers (CTPP).

    • HIPAA1. What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal legislation that set forth national standards to safeguard sensitive patient health information from unauthorized disclosure without the patient’s knowledge or consent. The HIPAA regulation consists of four rules: 1. Privacy Rule The Privacy Rule is designed to guarantee that entities handling health information implement appropriate measures to safeguard the information from unauthorized access or disclosure.Empower individuals with the knowledge and control over how their health information is utilized. Adherence to the Privacy Rule assures individuals seeking healthcare that an organization is dedicated to preserving the confidentiality and security of their information. Even if individuals are not interacting directly with an organization, they can trust the HIPAA framework to maintain the privacy of their data across all involved parties. 2. Security Rule The Security Rule is focused on protecting a specific subset of information encompassed by the Privacy Rule by establishing standards for the protection of electronically stored and transmitted PHI (ePHI). This is achieved by mandating the implementation of administrative, technical, and physical safeguards. Compliance with the Security Rule signifies an organization’s dedication to safeguarding the confidentiality, integrity, and security of ePHI, and…
      • Find the right software for your HIPAA compliance needs by comparing software capabilities, covered requirements, compliance impact, and the level of evidence the software supports. The HIPAA (Health Insurance Portability and Accountability Act of 1996) is a U.S. law that mandates national standards for protecting sensitive patient health information, known as protected health information (PHI).

    • NERC CIP1. What is NERC CIP? NERC CIP, which stands for North American Electric Reliability Corporation Critical Infrastructure Protection, is a collection of cybersecurity standards devised to safeguard the vital infrastructure of the North American electric grid. The objective of NERC CIP standards is to guarantee the reliability, security, and resilience of the electric power system by setting requirements for the identification and protection of critical assets and confidential information. Below is a summary of the NERC CIP framework: CIP-002: Critical Cyber Assets Identification: This requirement is centered on the identification and categorization of critical cyber assets within an organization’s control systems that are essential for the reliable operation of large-scale energy systems. CIP-003: Security Management Controls: This requirement is centered on the implementation of security management controls to establish and maintain an effective cybersecurity program. This encompasses the development of policies, conducting risk assessments, and implementing security controls. CIP-004: Personnel and Training: This requirement underscores the significance of qualified personnel and appropriate training to support an organization’s cybersecurity initiatives. CIP-005: Electronic Security Perimeter: This requirement is centered on establishing secure electronic access points or security perimeters to shield critical cyber assets from unauthorized access and cyber threats. CIP-006: Physical Security…
      • Select the best software solution for your NERC CIP compliance. Compare software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) is a set of cybersecurity standards designed to protect the critical infrastructure of the North American electric grid.

    • PCI DSS1. What is PCI DSS? Companies that store, process or transmit cardholder data are required to comply with the Payment Card Industry Data Security Standard (PCI DSS). This standard defined by the Payment Card Industry Security Standards Council (PCI SSC) specifies technical and operational requirements established to protect cardholder data, in-scope data includes the sensitive authentication data (stored on magnetic stripe data or equivalent on a chip, CVC2, CVV2, CID, PINs, PIN blocks) and the primary account number (PAN). The PCI SSC is responsible for managing the security standards, while compliance with the PCI set of standards is enforced by the founding members of the Council, American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Companies must undergo an annual security audit and quarterly network scan by PCI SSC approved providers. Not complying with the PCI DSS standard could lead to fines of non-compliance up to $500,000, expensive litigation costs, and being barred from cardholder data processing from card schemes. Furthermore, non-compliance has a direct impact on brand reputation and exposes companies to negative publicity that damages consumer confidence. The PCI DSS is composed of 12 requirements, organized into six control objectives: Build and Maintain a Secure…
      • Choose the appropriate software solution for your PCI DSS compliance. Evaluate software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. PCI DSS (Payment Card Industry Data Security Standard) specifies technical and operational requirements established to protect cardholder data, in-scope data includes the sensitive authentication data and the primary account number (PAN).

    • Browse all
  • By Frameworks
    • MITRE ATT&CK®1. What is MITRE ATT&CK? The MITRE ATT&CK is a comprehensive cybersecurity knowledge base of adversary tactics and techniques, grounded in actual real-world observations. This knowledge base provides a standardized approach to understanding, categorizing, and analyzing cyber threats and attack techniques. The MITRE ATT&CK was developed by MITRE, a nonprofit entity, established to offer engineering and technical advice to the federal government. The MITRE ATT&CK focuses on adversary behavior and provides insights into how cyber threats operate, their tactics, techniques, and procedures (TTPs), and the different stages of a cyber-attack. It is widely used in the cybersecurity industry and is valuable for organizations seeking to enhance their threat detection, incident response, and overall cybersecurity defenses. MITRE ATT&CK consists of a matrix that categorizes cyber threats based on the different stages of an attack, known as the “ATT&CK Matrix.” It includes the following components: Tactics: The high-level objectives that adversaries aim to achieve during a cyber-attack. These tactics include initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, exfiltration, and impact. Techniques: The specific methods and techniques used by adversaries to accomplish their objectives within each tactic. These techniques describe the step-by-step actions and procedures employed…
      • Select the appropriate software solution for MITRE ATT&CK mitigations by comparing software capabilities and covered mitigations supported by the software. MITRE ATT&CK is a comprehensive cybersecurity knowledge base of adversary tactics and techniques, based on real-world observations.

    • NIST CSF1. What is NIST CSF? The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized and widely adopted framework that provides a set of guidelines, best practices, and standards for improving cybersecurity risk management. The framework is specifically designed to help organizations, including critical infrastructure sectors, identify, protect, detect, respond to, and recover from cyber threats and incidents. The NIST CSF is based on industry standards and best practices, and it is a voluntary framework that organizations can adopt and tailor to their specific needs and risk profiles. It consists of three main components: Core: The Core is the heart of the framework and provides a set of cybersecurity activities and desired outcomes. It is organized into five key functions: Identify: This function involves understanding and managing cybersecurity risks by identifying critical assets, assessing vulnerabilities, and understanding the potential impact of cyber threats. Protect: The Protect function focuses on implementing safeguards to ensure the security and resilience of critical infrastructure. It includes activities such as access control, awareness training, data protection, and secure configurations. Detect: The Detect function involves continuous monitoring and timely detection of cybersecurity events. It includes activities such as threat intelligence, anomaly…
      • Find the right software solution for NIST CSF guidance by comparing software capabilities and covered guidance supported by the software. The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary guidance document intended to assist organizations in managing and mitigating cybersecurity risks. The framework is specifically designed to help organizations, including critical infrastructure sectors, identify, protect, detect, respond to, and recover from cyber threats and incidents.

    • NIST SP 800-53 (LOW)1. What is NIST SP800-53? The National Institute of Standards and Technology (NIST) Special Publication 800-53 (SP800-53) is a comprehensive cybersecurity framework that provides guidelines and controls for federal information systems and organizations. While it is not specifically focused on critical infrastructure, it serves as a valuable resource for enhancing cybersecurity practices in critical infrastructure sectors. NIST SP800-53 covers a wide range of security controls and best practices that organizations can implement to protect their information systems from various cyber threats. The framework is organized into 18 control families, each addressing a specific area of cybersecurity. Some of the key control families include: Access Control (AC): Controls related to granting and managing access to information systems and resources. This includes user identification, authentication, authorization, and accountability. Incident Response (IR): Controls focused on detecting, responding to, and recovering from cybersecurity incidents. It includes incident response planning, incident handling, and communication protocols. Configuration Management (CM): Controls related to establishing and maintaining secure configurations for information systems. This includes configuration baselines, change management processes, and configuration monitoring. System and Information Integrity (SI): Controls aimed at ensuring the integrity of information systems and data. This includes malware protection, security event monitoring, and vulnerability scanning.…
      • Select the appropriate software solution for NIST SP 800-53 (LOW) control baseline by comparing software capabilities and covered controls supported by the software. The NIST SP 800-53 (LOW: Low-Impact Systems) is a comprehensive cybersecurity framework that provides guidelines and controls for federal information systems and organizations. While it is not specifically focused on critical infrastructure, it serves as a valuable resource for enhancing cybersecurity practices in critical infrastructure sectors.

    • NIST SSDF1. What is NIST SSDF? The NIST SSDF (Secure Software Development Framework) is a cybersecurity framework developed by the National Institute of Standards and Technology (NIST) to help organizations secure their software development processes. The framework provides guidelines and best practices to integrate security into every phase of the software development life cycle (SDLC), from design to deployment and maintenance. The NIST SSDF Framework consists of a set of core principles and practices aimed at ensuring the development of secure and resilient software. It emphasizes the importance of proactive security measures and risk management throughout the entire software development process. Key components of the NIST SSDF Framework include: Risk Assessment: The framework emphasizes the need for conducting risk assessments early in the software development life cycle. This involves identifying potential security risks and vulnerabilities and analyzing their potential impact on the software and the overall system. Security Requirements: The NIST SSDF Framework promotes the inclusion of security requirements in the software development process. These requirements are defined based on the identified risks and help guide the development team in implementing appropriate security controls. Secure Design: The framework emphasizes the importance of secure design principles in developing resilient software. This involves…
      • Choose the appropriate software solution for NIST SSDF practices by comparing software capabilities and covered practices supported by the software. The NIST SSDF (Secure Software Development Framework) is a cybersecurity framework developed by the NIST to help organizations secure their software development processes. The framework provides guidelines and best practices to integrate security into every phase of the software development life cycle (SDLC), from design to deployment and maintenance.

    • Browse all
  • Services
    • Compliance for Software
      • PCI DSS
      • NERC CIP
      • NIST CSF
      • Evaluate your software’s capabilities that support PCI DSS compliance

      • Assess your software’s features that help organizations achieve NERC CIP compliance

      • Review your software’s features that align with NIST CSF best practices

      • NIST SSDF
      • ISO/IEC 27001
      • HIPAA
      • Evaluate your software’s features that help organizations meet NIST SSDF practices

      • Assess your software’s features supporting ISO/IEC 27001 compliance

      • Evaluate your software’s features that help organizations meet HIPAA compliance

      • Browse all
    • Strategy and Risk
      • Strategy and Risk consulting services assist critical infrastructure organizations in identifying, assessing, and mitigating potential risks through a structured approach. This enables businesses to align cybersecurity with their objectives while safeguarding assets and reputation

    • Cybersecurity for OT
      • Cybersecurity consulting services for OT known as Operational Technology (OT), focuses on safeguarding Industrial Control Systems (ICS) that oversee critical industrial processes. These systems, including SCADA, DCS, PLCs, HMIs, and sensors, are essential in various sectors, from power generation to manufacturing and transportation

  • Resources
    • Latest News
      • Stay up to date with the latest cybersecurity regulations, standards, frameworks, and industry best practices.

    • Blog
      • Receive updates and practical insights on the implementation of cybersecurity regulations, standards, requirements, frameworks, and best practices.

    • Reports
      • Reports and research on emerging cybersecurity frameworks, guidelines, regulations, and industry best practices to provide a comprehensive understanding of the evolving cybersecurity landscape.

    • Data Sheets
      • Learn how organizations improve compliance with cybersecurity regulations, standards, frameworks, and best practices through our services.

    • White Papers
      • Access white papers on cybersecurity regulations, standards, requirements, frameworks, and best practices.

  • About
  • FAQ
Home / Products

Showing 1–10 of 843 results

  • Placeholder

    10Duke Enterprise

    Read more
  • Placeholder

    1E Platform

    Read more
  • 3ntity

    3ntity

    Read more
  • Placeholder

    3rdRisk

    Read more
  • Placeholder

    6clicks

    Read more
  • Placeholder

    A1 Tracker

    Read more
  • Placeholder

    Absolute Secure Endpoint

    Read more
  • Placeholder

    Access Assurance Suite (AAS)

    Read more
  • Placeholder

    Access Auditor

    Read more
  • Placeholder

    Access Sentinel

    Read more
  • 1
  • 2
  • 3
  • 4
  • …
  • 83
  • 84
  • 85
  • →
Compliance Labs logo

Compliance Services for Customers & Vendors | Compliance Labs

Compliance Labs - All rights reserved

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Software logo
  • Vendor
  • What is this Software?
  • Website
  • Cybersecurity Regulations, Standards and Guidelines Tested
  • Other Cybersecurity Regulations, Standards and Guidelines Supported
  • Deployment
  • Environment
  • Region
  • Industry
  • Capabilities
  • Application and DevOps Security
  • Asset Inventory and Management
  • Audit and Compliance Management
  • Awareness and Training
  • Backup and Recovery
  • Data Security
  • Endpoint and Device Protection
  • Identity Management and Access Control
  • Incident Response
  • Logging and Threat Detection
  • Network security
  • Posture and Vulnerability Management
  • Risk Assessment and Management
  • Software Bill Of Materials (SBOM)
  • Zero Trust Network Access
  • DORA Requirements Supported by the Software
  • HIPAA Requirements Supported by the Software
  • MITRE Mitigations Enterprise Supported by the Software
  • ISO/IEC 27001 Requirements Supported by the Software
  • NERC CIP Requirements Supported by the Software
  • NIST CSF Controls Supported by the Software
  • NIST SP6800-53 (LOW) Controls Supported by the Software
  • NIST SSDF Controls Supported by the Software
  • PCI DSS Requirements Supported by the Software
  • Scope Impact
  • Periodic compliance activities supported by the Software
  • The Software store, process, or transmit
  • The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
  • Software modules implemented
  • Software vendor Third-Party Service Providers (TPSPs) used
  • Software NERC CIP scoping
  • Software NIST SSDF scoping
  • Software PCI DSS scoping
Compare
Compare ×
View comparison Continue browsing software