Home
Services
Compilance Monitoring
Risk Management
Vendor Assessment
Policy Management
All Services
Frameworks
SOC 2
PCI DSS
ISO 27001
GDPR
CCPA
All Frameworks
Resource
Blog
Glossary
Case Study
Company
About Us
Careers
Contact Us
Login
Book a Demo
Archives:
Glossary
December 14, 2023
Vulnerability Scan
A Vulnerability Scan is a systematic process of identifying, assessing,…
December 14, 2023
Vendor Risk Assessment
A Vendor Risk Assessment (VRA) is a systematic process of…
December 14, 2023
System Description
System Description is a SOC 2 report on business systems,…
December 14, 2023
Social Engineering
The term “social engineering” describes the use of psychological manipulation…
December 14, 2023
Security Questionnaires
Security questionnaires are a structured set of inquiries designed to…
December 14, 2023
SOC 3
A higher level and more succinct version of SOC 2,…
December 14, 2023
SOC 2 Type II
A SOC 2 Type 2 report looks at the system…
December 14, 2023
SOC 2 Type I
SOC 2 Type I is a foundational step for organizations…
December 7, 2023
Trust Services Criteria
Trust Service Criteria is a set of criteria developed by…
December 7, 2023
SOC 2 Report
SOC 2 Report is a comprehensive report generated based on…
Search
Search
Recent Posts
Myths of PCI DSS Compliance Regulation Explained!
SOC 2 Compliance Checklist- A Complete Understanding For 2024
What Is PCI DSS Compliance?
What Businesses Need PCI DSS Compliance?
A Complete Guide To SOC 2 Compliance Documentation
Recent Comments
No comments to show.
Archives
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
Categories
CCPA
Comparison
GDPR
ISO 27001
PCI DSS Compliance
SOC 2
Share this Article
Facebook
Twitter
LinkedIn