Security Compliance
 

Security Compliance: Most exhaustive coverage of third-party certifications

ISO 27001:2013
Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.
 
SSAE SOC I and SOC II Type 2
Mentions internal controls capturing how a company safeguards customer data and how well those controls are operating.
 
aicapa iso spc
Trust Arc Asia-Pacific Economic Cooperation (APEC) Privacy Recognition for Processor (PRP) System Certification
PRP certification represents the requirements you must meet in order to be recognized as a qualified processor by data controllers.
 
Truste
3rd Party VAPT
VAPT is a term used to describe security testing that is designed to identify and help address cyber security vulnerabilities.
 
netsquare
Information Security Registered Assessors Program (IRAP) Certification
Comprehensive process for the independent assessment of a system's security against Australian government policies and guidelines.
 
irap
ISO 9594-8
Specifies data objects used to represent the public-key certificates themselves, & revocation notices for issued public-key certificates that should no longer be trusted.
 
ISO 9594-8
FIPS 140-2
US and Canadian government standard that specifies the security requirements for cryptographic modules that protect sensitive information.
 
FIPS 140-2
FIPS 186-4
The Standard specifies a suite of algorithms that can be used to generate a digital signature.
 
FIPS 140-2

REQUEST DEMO

 Yes! I'd like to stay informed with the latest content, industry trends, news, and events from Certinal.
By submitting this data, I acknowledge that I have read the Privacy Policy of Certinal and consent to the processing of my personal data in accordance with the terms of the Privacy Policy.