At Veritas, we adhere to a rigorous program designed to support international compliance requirements. Using third-party audits and industry-recognized certifications, we ensure data security and privacy, protect against threats or data breaches, and prevent unauthorized access of your data.
Our products regularly receive independent verification of their security, privacy, and compliance controls. Certifications and requirements may vary by product.
Veritas prioritizes accessibility in its digital offerings, ensuring alignment with the Web Content Accessibility Guidelines (WCAG) set forth by the World Wide Web Consortium. While achieving universal accessibility can present challenges, Veritas undertakes regular evaluations of its platforms. By addressing any identified issues promptly, Veritas showcases its unwavering commitment to providing an inclusive user experience for everyone.
AWS GovCloud (US) is designed for government customers and their partners, offering a secure cloud solution environment. It ensures compliance with several stringent standards and regulatory frameworks, including:
This ensures that users can operate within a compliant, secure, and flexible cloud infrastructure tailored to the unique needs of government entities.
Microsoft Azure Government has been developed to meet the rigorous compliance standards required by U.S. government entities. It has secured approvals and authorizations from critical frameworks, such as:
For its specific U.S. government regions—Arizona, Texas, and Virginia—Azure Government has earned:
The Cybersecurity Maturity Model Certification (CMMC) is a framework developed by the U.S. Department of Defense (DoD) to assess and enhance the cybersecurity posture of defense contractors and subcontractors in the Defense Industrial Base (DIB). CMMC requires contractors to meet specific cybersecurity standards and practices to bid on DoD contracts at different maturity levels, ranging from basic cybersecurity hygiene to advanced practices.
The Common Criteria for IT Security Evaluation, together with its counterpart, the Common Methodology for IT Security Evaluation, serves as the foundational element of the international Common Criteria Recognition Arrangement. This ensures that:
The Defense Information Systems Agency’s (DISA) Security Technical Implementation Guides (STIGs) serve as configuration benchmarks intended to optimize security across both hardware and software. Their primary goal is to protect the Department of Defense’s IT infrastructure.
The Federal Information Processing Standard (FIPS) 140-2 outlines security expectations for cryptographic modules. It covers a spectrum of applications and surroundings through four progressive qualitative stages. Key areas include design specifications, ports, interfaces, roles, physical security, operational environment, cryptographic key management, electromagnetic considerations, self-tests, design assurance, and attack mitigation.
The Information Security Registered Assessors Program (IRAP) is an initiative by the Australian Cyber Security Centre (ACSC) to enhance the cybersecurity posture of Australian government agencies and organizations that provide services to the government.
The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency within the U.S. Department of Commerce that promotes U.S. innovation and industrial competitiveness. NIST developed cybersecurity frameworks and standards, such as the NIST Cybersecurity Framework (CSF) that provides guidance for organizations to manage and improve their cybersecurity risk management processes. Some notable Special Publications (SP)/Risk Management Frameworks (RMF) are NIST SP 800-53, NIST SP 800-37 RMF, Intelligence Community Directive (ICD) 503, NIST 800-171, and NIST 800-218.
Sheltered Harbor is a not-for-profit industry initiative in the U.S. aimed at enhancing the resilience and security of the financial sector against cyber threats and operational risks. This was launched in response to the increasing frequency and sophistication of cyberattacks targeting financial institutions. By adopting Sheltered Harbor’s standards as best practice, financial institutions can better protect their customers’ assets and maintain trust and confidence in the stability and security of the financial system.
SOC 2 assessments provide independent, third-party examination documents that highlight how an organization upholds essential compliance controls and aims. Developed in line with the Auditing Standards Board of the AICPA’s Trust Services Criteria, these evaluations focus on an organization’s information systems in relation to aspects like security, availability, integrity, confidentiality, and privacy.
The Transport Layer Security (TLS) 1.3 cryptographic protocol provides mechanisms to securely protect data during internet communications. TLS operates by establishing a secure connection between a client and server using encryption, authentication, and key exchange mechanisms.
Policies set by the Financial Industry Regulatory Authority dictate that data must be securely retained, encrypted, and immutably stored on Write Once Read Many (WORM) media. Such data must be retrievable, with organizations capable of providing comprehensive audit trails for data usage and deletion.
Veritas offers products and services in 95 countries. Learn more about our compliance with laws and regulations addressing electrical, environmental, and sustainability certifications for specific products and in different regions.
Our products support data protection for global organizations from Asia to Europe and beyond via implementing standards of internationalization (I18N) and localization (L10N).
Veritas and its products (software, hardware, and technology) and services (collectively, “Veritas Solutions”) are subject to United States (including, but not limited to, the U.S. Department of Commerce Export Administration Regulations (“EAR”) and the U.S. Office of Foreign Assets Control (“OFAC”) regulations), European Union, Singapore, and all other applicable government export controls, import, and sanctions laws and regulations in the jurisdictions in which the company operates. Veritas Technologies, all subsidiary companies, and entities maintain compliance through strict adherence to a robust internal control program.