Friday, March 24, 2017
Home » Tag Archives: Managed Security

Tag Archives: Managed Security

FCCP, a formula for success

FedRAMP JAB P-ATO + PaaS + flexibility + agency specific security controls = Datapipe’s Federal Community Cloud Platform (FCCP). Last week, we announced that Datapipe received its JAB P-ATO for the FCCP PaaS solution. If you recall from the Understanding the Multiple Versions of the FedRAMP ATOs blog, there are three types of P-ATOs that a cloud service provider (CSP) …

Read More »

A closer look at Datapipe’s Federal Community Cloud Platform

Yesterday, we announced that Datapipe has been granted a Provisional FedRAMP Authority to Operate (P-ATO) from the Joint Authorization Board (JAB) for our Federal Community Cloud Platform (FCCP) the first ATO issued to a Platform as a Service (PaaS) covering management through the virtual operating system and includes all security controls for both the virtual network and servers, giving agencies …

Read More »

IaaS, SaaS, and PaaS – Ohh My!

In Understanding the Multiple Versions of the FedRAMP ATOs, we provided a high level overview of the three types of provisional ATOs (P-ATO) available to a government agency. Today, we’d like to dive into the differences between the types of cloud offerings that are available. Those are infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as …

Read More »

Back to basics: FedRAMP

We recently discussed the three unique paths to receiving a FedRAMP provisional authority to operate (P-ATO) and how to determine which type of FedRAMP P-ATO’d cloud platform is right for an agency’s applications. We determined that an agency should select the P-ATO’d cloud platform that is capable of meeting the agency’s security control requirements or is flexible enough to layer …

Read More »

Understanding the Multiple Versions of the FedRAMP ATOs

The purpose of FedRAMP is simple – to act as a common set of security controls that can be accepted government-wide. However, since the July 2014 FedRAMP rollout, this security risk management program has gotten increasingly complex. With the initial FedRAMP rollout, the Joint Authorization Board (JAB), which is comprised of the CIOs from the Department of Homeland Security (DHS), …

Read More »

The Real Cost of Data Breaches

datapipe compliance cloud age blog

Recently it seems like large-scale data breaches are an almost weekly occurrence. But, just because they are more commonplace does not mean their impacts are any less severe for businesses or for customers whose data is compromised. Though there were several high profile data breaches in the last 9 months — eBay, AOL (again!), Neiman Marcus and more — the …

Read More »

Expanding our Compliance Expertise

Datapipe was among the first to achieve Level 1 PCI Certified Service Provider status and we’ve successfully delivered our turnkey PCI solution to enterprise level clients from a range of industries. Enabling our clients to achieve and maintain compliance requires highly trained experts with outstanding credentials who stay on the cutting edge of technology and best practices.  When the PCI DSS Security …

Read More »

Optimizing Managed Security Operations

Today’s digital economy means that just about every business and organization out there has to find a way to secure their IT assets to protect mission-critical data and meet some level of compliance regulations. Datapipe provides our clients with a range of security and compliance solutions that run on industry-leading technology services such as Tripwire Enterprise . As a result of implementing Tripwire’s continuous audit …

Read More »

Datapipe Adds NeXpose to Managed Security and Compliance Solution

Datapipe, announced today a contract with Rapid7® to utilize its Vulnerability Assessment solution NeXpose as part of its managed security services and PCI DSS compliance solution. NeXpose delivers an unrivaled breadth of unified vulnerability scanning and was ranked the highest possible rating of “strong-positive” in Gartner’s MarketScope for Vulnerability Assessment 2010. “Vulnerability Assessment is a critical component of our managed …

Read More »