Stig

SteelCloud Delivers Cyber Compliance Software to a NATO Ministry of Defense

Retrieved on: 
Wednesday, November 1, 2023

ASHBURN, Va., Nov. 1, 2023 /PRNewswire/ -- SteelCloud LLC, a leading STIG and CIS compliance automation software developer, announced today that a NATO Ministry of Defense has licensed its ConfigOS STIG compliance automation software. This is the first expansion of the implementation of ConfigOS into a European defense organization.

Key Points: 
  • ASHBURN, Va., Nov. 1, 2023 /PRNewswire/ -- SteelCloud LLC , a leading STIG and CIS compliance automation software developer, announced today that a NATO Ministry of Defense has licensed its ConfigOS STIG compliance automation software.
  • This is the first expansion of the implementation of ConfigOS into a European defense organization.
  • "The STIGs are the gold standard for cyber hygiene in military computer infrastructures," said Brian Hajost, SteelCloud Chief Operating Officer.
  • The ConfigOS compliance software suite will address hardening and continuous compliance for both Windows and Linux-based computer assets.

SteelCloud Delivers Cyber Compliance Software to a NATO Ministry of Defense

Retrieved on: 
Wednesday, November 1, 2023

ASHBURN, Va., Nov. 1, 2023 /PRNewswire/ -- SteelCloud LLC, a leading STIG and CIS compliance automation software developer, announced today that a NATO Ministry of Defense has licensed its ConfigOS STIG compliance automation software. This is the first expansion of the implementation of ConfigOS into a European defense organization.

Key Points: 
  • ASHBURN, Va., Nov. 1, 2023 /PRNewswire/ -- SteelCloud LLC , a leading STIG and CIS compliance automation software developer, announced today that a NATO Ministry of Defense has licensed its ConfigOS STIG compliance automation software.
  • This is the first expansion of the implementation of ConfigOS into a European defense organization.
  • "The STIGs are the gold standard for cyber hygiene in military computer infrastructures," said Brian Hajost, SteelCloud Chief Operating Officer.
  • The ConfigOS compliance software suite will address hardening and continuous compliance for both Windows and Linux-based computer assets.

U.S. Army Selects BackBox to Automate Multi-Vendor Network Environment

Retrieved on: 
Tuesday, August 29, 2023

DALLAS, Aug. 29, 2023 /PRNewswire/ -- BackBox, the world's most trusted network automation company, today announced the U.S. Army selected BackBox's Network Automation Platform to automate Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) compliance of their multivendor network environment. BackBox integrates with all major network monitoring platforms and has added new features to enable customers to easily migrate from less sophisticated network automation tools to BackBox.

Key Points: 
  • BackBox automates DISA STIG compliance, saving network administrators from more than 90 manual configuration steps
    DALLAS, Aug. 29, 2023 /PRNewswire/ -- BackBox , the world's most trusted network automation company, today announced the U.S. Army selected BackBox's Network Automation Platform to automate Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) compliance of their multivendor network environment.
  • BackBox integrates with all major network monitoring platforms and has added new features to enable customers to easily migrate from less sophisticated network automation tools to BackBox.
  • The BackBox Network Automation Platform supports centralized automation of firewalls and network devices from hundreds of vendors.
  • BackBox was named Best Network Automation Solution in the Centralized Multi Vendor category in the 2022 'ASTORS' Homeland Security Awards.

Rancher Government Solutions Announces Fully Supported No-Code Deployment of Rancher on AWS GovCloud

Retrieved on: 
Wednesday, June 21, 2023

Rancher Government Solutions (RGS), the leader in open source, cloud-native container management, announced today the launch of its highly available and fully supported deployment of Rancher Kubernetes Engine 2 (RKE2) and Rancher Manager on AWS GovCloud Marketplace, to help Federal customers accelerate their Kubernetes journey in the cloud.

Key Points: 
  • Rancher Government Solutions (RGS), the leader in open source, cloud-native container management, announced today the launch of its highly available and fully supported deployment of Rancher Kubernetes Engine 2 (RKE2) and Rancher Manager on AWS GovCloud Marketplace, to help Federal customers accelerate their Kubernetes journey in the cloud.
  • Rancher Manager and RKE2 are the only Kubernetes management platform and distribution with STIGs officially validated and published by DISA.
  • “We enable customers to bring the combined advantages across hybrid environments with the full backing and support of Rancher Government Solutions.”
    RGS recently released Rancher Manager-RKE2 Test Flight on AWS GovCloud, an unsupported, HA free trial of RKE2 and Rancher Manager for government customers.
  • RKE2 is a certified Kubernetes distribution focused on security to adhere to the robust compliance requirements of the U.S. Government.

Dell Technologies Storage Software Innovations Bolster Cyber Resilience and Advance IT Efficiency

Retrieved on: 
Wednesday, May 10, 2023

Dell PowerStore security enhancements accelerate Zero Trust adoption to help customers better protect, prevent and respond to cyberattacks

Key Points: 
  • Dell PowerStore security enhancements accelerate Zero Trust adoption to help customers better protect, prevent and respond to cyberattacks
    Advancements across the Dell Storage portfolio span automation to improve cyber resilience, DevOps and system performance
    Dell Technologies (NYSE: DELL) advances software-driven innovation across its industry-leading3 storage portfolio, driving increased cyber resiliency, energy efficiency and automation to power customers' multicloud journeys.
  • Dell's commitment to software development has resulted in more than 2,000 storage portfolio advancements in the past twelve months across every category of the external storage industry.
  • These advances are available at no additional cost to existing customers and are consumable through on-premises software or as-a-Service via Dell APEX.
  • Through PowerStore's new security software enhancements, Dell is helping customers accelerate Zero Trust adoption to better protect, prevent and respond to cyberattacks.

Noname Security Announces the Industry’s First Comprehensive, Hardened API Security Platform

Retrieved on: 
Wednesday, April 5, 2023

SAN JOSE, Calif., April 05, 2023 (GLOBE NEWSWIRE) -- Noname Security , the leading provider of complete and proactive API security, today announced Noname Public Sector’s Hardened Virtual Appliance making the API security platform available to the U.S. Federal Government, highly regulated industry customers, and FedRAMP-authorized vendors.

Key Points: 
  • SAN JOSE, Calif., April 05, 2023 (GLOBE NEWSWIRE) -- Noname Security , the leading provider of complete and proactive API security, today announced Noname Public Sector’s Hardened Virtual Appliance making the API security platform available to the U.S. Federal Government, highly regulated industry customers, and FedRAMP-authorized vendors.
  • Noname Security’s Hardened Virtual Appliance makes the API security platform available completely offline with no reliance on internet connectivity, perfect for isolated and controlled environments.
  • Noname Security’s Hardened Virtual Appliance enables access to a powerful, complete, and easy-to-use API security platform that helps:
    Discover all APIs, data, and metadata - Unlike other API solutions that only look at traffic sources, Noname Security discovers more APIs by combining traffic sources with the configuration of infrastructure and applications.
  • Analyze API behavior and detect all API threats - The Noname API Security Platform uses AI-based detection to identify the broadest set of API vulnerabilities, including data leakage, data tampering, misconfigurations, data policy violations, suspicious behavior, and cyber attacks.

Rancher Government Solutions Launches Groundbreaking Software Supply Chain Security Solution, Carbide

Retrieved on: 
Wednesday, March 1, 2023

Rancher Government Solutions , the leader for securing Kubernetes and cloud native, containerized applications for the U.S. government, has launched Rancher Government Carbide , a revolutionary supply chain security solution, in response to increasing threats to the nation’s software supply chain.

Key Points: 
  • Rancher Government Solutions , the leader for securing Kubernetes and cloud native, containerized applications for the U.S. government, has launched Rancher Government Carbide , a revolutionary supply chain security solution, in response to increasing threats to the nation’s software supply chain.
  • Rancher Government Carbide secures the software supply chain by verifying provenance back to a trusted entity using a centralized secure container registry for end users, validated by a secured signing key.
  • “At Rancher Government Solutions, we know securing the software supply chain is mission critical to our federal customers, particularly given the increased frequency of attacks,” said Brandon Gulla, Vice President and Chief Technology Officer at Rancher Government Solutions.
  • Rancher Government Carbide delivers cutting-edge capabilities to enable software supply chain security and support federal security compliance requirements to meet the challenges and strict security needs of the U.S. Government, DoD, and Intelligence Community (IC).

Puppet by Perforce Announces Continuous Compliance for DISA STIGs

Retrieved on: 
Monday, October 24, 2022

PORTLAND, Ore., Oct. 24, 2022 /PRNewswire/ -- Puppet by Perforce, the leader in infrastructure automation, has deepened its commitment to U.S. federal government agencies with the latest release of Compliance Enforcement Modules (CEM). The new update directly supports U.S. Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs). With Compliance Enforcement Modules, federal IT teams can automate continuous DISA STIGs compliance without the delays, risk, and costs associated with traditional, manual approaches. Compliance Enforcement Modules work natively with Puppet Enterprise and Puppet Comply to help users find and fix compliance issues across their enterprise. Federal IT teams receive real-time visibility into the status of their overall compliance posture and can quickly find and fix DISA STIGs compliance issues while continually enforcing desired state compliance.

Key Points: 
  • With Compliance Enforcement Modules, federal IT teams can automate continuous DISA STIGs compliance without the delays, risk, and costs associated with traditional, manual approaches.
  • Compliance Enforcement Modules work natively with Puppet Enterprise and Puppet Comply to help users find and fix compliance issues across their enterprise.
  • Federal IT teams receive real-time visibility into the status of their overall compliance posture and can quickly find and fix DISA STIGs compliance issues while continually enforcing desired state compliance.
  • Maintaining continuous compliance with relevant STIGs is a requirment for many government agencies and their contractors and is monitored by regular government audits for compliance.

Defense Information Systems Agency Releases VMware NSX® Security Technical Implementation Guide

Retrieved on: 
Wednesday, April 27, 2022

VMware Inc. (NYSE: VMW) today announced that the Defense Information Systems Agency (DISA) has added the Security Technical Implementation Guide (STIG) for VMware NSX to the Department of Defense (DoD) Cyber Exchange.

Key Points: 
  • VMware Inc. (NYSE: VMW) today announced that the Defense Information Systems Agency (DISA) has added the Security Technical Implementation Guide (STIG) for VMware NSX to the Department of Defense (DoD) Cyber Exchange.
  • The updated DISA STIG outlines the installation requirements, security policies and controls for deploying VMware NSX within the Department of Defense and other federal agencies.
  • The STIG requirements confirm VMware NSX implementation is consistent with DoD cybersecurity policies, standards, architectures, security controls and validation procedures, when applicable NIST SP 800-53 cybersecurity controls are applied to all systems and architectures.
  • The DISA STIG for VMware NSX provides guidance on configuring various components of an NSX environment, including the NSX Manager, Gateway Router, Distributed Firewall, and Gateway Firewall.

DISA Validates Rancher Government Solutions’ Security Technical Implementation Guide for the Rancher Multi-cluster Manager 2.6 for Kubernetes

Retrieved on: 
Monday, April 25, 2022

In a major validation of Rancher Government Solutions https://rancher.com/government (RGS) security posture, the Defense Information Systems Agency (DISA) has announced that it has published and validated the Security Technical Implementation Guide (STIG) for the Rancher Multi-cluster Manager version 2.6 (MCM) for Kubernetes.

Key Points: 
  • In a major validation of Rancher Government Solutions https://rancher.com/government (RGS) security posture, the Defense Information Systems Agency (DISA) has announced that it has published and validated the Security Technical Implementation Guide (STIG) for the Rancher Multi-cluster Manager version 2.6 (MCM) for Kubernetes.
  • STIG validation is a security review and configuration standard that helps ensure IT products and military agencies are complying with DoD security policies.
  • This announcement by DISA validates Rancher Government Solutions dedication, commitment and investment into ensuring that the open source products we support meet the highest security standards of the DoD and IC, said Lynne Chamberlain, President and CEO of Rancher Government Solutions.
  • DISAs actions validate Rancher Government Solutions commitment to meeting the challenges and the strict security needs of the US Government, DoD and IC.