Titania’s module automates the audit process for critical CMMC security practices


Titania has launched a new tool to automate checks of the defense industrial base core network security practices to meet the specifications set by the Department of Defense (DoD) as part of its CMMC standards. It is the solution with dedicated built-in capabilities that meet these new requirements, which affect more than 300,000 defense supply chain companies who are responsible for protecting sensitive information.

The module is available as part of Titania’s Nipper solution, software that accurately identifies exploitable vulnerabilities in firewalls, switches and routers and automatically prioritizes recommended mitigation actions based on RMF compliance and / or security risk. Nipper, used by the four branches of DoD, also provides precise engineering fixes to help organizations fix configuration errors and stay secure.

Now, the new module automates the audit process for dozens of the most critical CMMC security practices for the core network. It produces a CMMC rater ready report that shows compliance within minutes and provides a priority list and remedial advice to resolve any issues. So, in addition to the solution allowing organizations to save an hour of audit time per device – which can add up to $ 200 per device – the module can also be used to significantly reduce average remediation time and ensure the security of compliance.

“The federal government cannot afford another cyberattack like the one that targeted the SolarWinds. This is one of the reasons that DoD requires all vendors to demonstrate an appropriate level of proactive cybersecurity. Anyone who does or wants to do business with the Pentagon will have to comply and that won’t come easily for many, ”said Matt Malarkey, vice president, Strategic Alliances, Titania North America.

“We have developed this new module to help businesses of all sizes respond quickly and affordably to requirements by assessing compliance, generating evidence, and providing information on vulnerabilities that need to be addressed so that vendors can both stay compliant and prioritize the correction of any problem. critical issues first, ”Malarkey continued.

All contractors and service providers who render services to the DoD and process sensitive government information will be required to comply with CMMC standards and become CMMC accredited, which includes verification and verification of third party compliance every three years. Failure to comply could cost an organization its eligibility for public procurement.

Since all DoD contracts will have a CMMC requirement by 2025, Titania Nipper’s new module will quickly put suppliers on track to meet these standards. It will help businesses achieve compliance with up to 89% of CMMC core network device practices.

Colin Bowers, President of Ramparts LLC, a provisional CMMC certified assessor for Levels 1 to 3, said, “I have used the new CMMC module from NIPPER as a tester, assessor, tool developer and network designer. security. I have found that not only does it save time, but that it provided objective evidence that can be used during a CMMC assessment and remedial options during CMMC pre-assessments.

Nipper’s on-demand CMMC tool provides an accurate automated assessment of 18 of 24 (75%) core network device security practices where automation is possible. It also provides evidence for manual assessment for the other six.

Some of the additional benefits include the ability to:

  • Establish a baseline to create a roadmap to compliance
  • Document the evidence in the results in formats ready for certified assessors.
  • Describe the exact technical fixes so that configuration errors can be corrected.

Titania’s CMMC module is available immediately.


Source link

Previous Fundamentally strong economy thanks to the agricultural sector: Rector of LSE - Pakistan
Next Monitoring of the Covid-19 recovery of the medical sector: how did the sector perform in the second quarter of 2021?

No Comment

Leave a reply

Your email address will not be published. Required fields are marked *