Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2023

Vanta crosses 500 raving reviews on G2

At the top of Vanta’s principles is to “Put customers first.” It turns out, when you put customers first by building a product based on customers’ needs, along with providing best-in-class support, customers rave about their experience. So today, Vanta is thrilled to announce that we’ve reached an exciting milestone: Crossing 500 reviews on G2.

Craft Fireside Chat: Building Trust in a Zero Trust World

Watch Christina Cacioppo (CEO & Co-Founder at Vanta), Diane Garcia (Director of Operations at Scratchpad), and Bil Harmer (Operating Partner, Security at Craft Ventures) for a conversation about the importance of trust and compliance and how to execute a strategy that works for your company and customers.

What is continuous security monitoring?

‍ Continuous security monitoring refers to an ongoing monitoring system that keeps a constant watch for security vulnerabilities, the state of your information security controls, and potential risks and threats to your information security. ‍ If you think too much about information security, it can seem insurmountable. At any given moment, there could be teams of hackers trying everything in their power to get access to your data.

How do you perform quarterly access reviews?

Savvy organizations usually deploy some type of identity and access management (IAM) solution. IAM solutions leverage the principle of least privilege (POLP), role-based access control (RBAC), or other such mechanisms to manage access to data, applications, and IT infrastructure. ‍ However, every organization's structure and human resources capacity typically change over time as new employees are brought on board and existing ones quit.

Reimagining the future of trust with Trustpage by Vanta

Vanta’s mission is to secure the internet and protect consumer data. An important step to making this a reality is ensuring that every company can prove its own security to customers and prospects—creating a virtuous cycle where good security is good business. Today, we're thrilled to announce the next move in achieving our mission with Vanta's acquisition of Trustpage to reimagine the future of trust together. ‍

What is vulnerability scanning?

Vulnerability scanning is the action of conducting an automated review of your system to look for potential risks and vulnerabilities. For budding information security professionals (or even those who have worked in the field for years), there is always something new to learn. Not only is it a highly intricate and advanced field but, on a daily basis, there is a cat-and-mouse game happening between security engineers and hackers.

Do you need penetration testing for compliance?

A lack of compliance is increasingly becoming a major barrier for sales, forcing security directors to be more in tune with their organization’s revenue and growth goals than ever before. To help ease this pressure, companies are seeking to fulfill compliance requirements faster. ‍ In this article, we’re deep diving into the two most common security testing options that companies employ for their compliance initiatives: penetration testing and vulnerability scanning.

What is an access review?

An access review describes the process of monitoring the rights and privileges of everyone who can interact with data and applications. This includes management of personnel, employees, vendors, service providers, and other third parties that your organization has been involved with. ‍ Also known as entitlement review, account attestation, or account recertification, access reviews are essential to the management, monitoring, and auditing of user account lifecycles.