FDIC Selects Shavlik
Shavlik NetChk Compliance helps FDIC meet government mandates that require proof of configuration security
ST. PAUL, Minn. -- Shavlik Technologies, LLC, the market leader in simplifying complex enterprise network configuration, compliance and security, today announced that the Federal Deposit Insurance Corporation (FDIC), an independent agency of the US federal government, recently selected Shavlik NetChk® Compliance to simplify and automate the process of managing and proving compliance with new FISMA requirements.
The Federal Information Security Management Act of 2002 is a US federal government regulation established to bolster computer and network security within the Federal Government and affiliated parties (such as government contractors) by mandating yearly audits of IT controls. FISMA now requires agencies to develop acceptable system configuration requirements and report on compliance with the configuration requirements during their annual FISMA audit.
The FDIC has implemented Shavlik NetChk Compliance to simplify and automate the development of system configurations and policies, apply them across all systems on the network, and easily generate reports on system compliance to provide to the Office of the Inspector General during their annual FISMA audit.
“We are pleased that the FDIC has selected Shavlik NetChk Compliance to reduce overall risk and support their new requirements for FISMA reporting,” said Mark Shavlik, CEO for Shavlik Technologies. “Many organizations today are placing a higher level of importance on maintaining secure and consistent system configurations, as the industry in general recognizes the major threat that mis-configured systems pose to a network. Our solutions make it very easy for customers to generate and distribute approved configurations, and then automate the process for ongoing assessment, remediation and management of systems to ensure network-wide compliance.”
Read more about:
2007About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024