Veritas is committed to transparency around our development practices and management of security vulnerabilities. We put security at the core of our product development, infrastructure, and processes. Read our Vulnerability Management Commitment and Disclosure policy to learn more.
Veritas takes security seriously and prioritizes the protection of your critical data and applications. Our comprehensive approach ensures that we address all aspects of cybersecurity to maintain a resilient environment for our customers and partners. Trust Veritas to uphold the highest standards of security and safeguard your valuable assets.
Security begins in product development, where we use secure coding methods and analysis tools. Veritas products undergo penetration testing by an independent third-party firm at least annually. Internally, our Product Security Group (PSG) conducts scans as part of the release of a new product version. In addition to managing schedules for pen testing and internal vulnerability scans, PSG also maintains the Veritas Application Security Assurance Program (ASAP) to ensure each product follows a secure development lifecycle.
The Veritas Secure Software Development Framework and ASAP program are modeled after NIST SP 800-218, a core set of software development practices focused on mitigating vulnerabilities.
Veritas aligns to the National Institute of Standards and Technology (NIST) framework—a standard that addresses cyber resiliency as five key pillars: Identify, Protect, Detect, Respond, and Recover.
Our products adhere to two of the core principles recommended by the Cybersecurity and Infrastructure Security Agency, National Security Agency, Federal Bureau of Investigation, and multiple international security agencies.
We design and build products in a way that reasonably protects against malicious cyber actors gaining access to data.
Our products are resilient against prevalent exploitation techniques out of the box without additional charge.
Based on the Microsoft Secure Development Lifecycle, Veritas ASAP addresses real-world challenges and the requirements of U.S. Presidential Executive Order 14028. Our program uses automated security tools and manual techniques to identify product vulnerabilities per the executive order and CISA requirements. We score the severity of vulnerabilities using the industry-standard Common Vulnerability Scoring System to guide the urgency of remediation and public notifications.
Veritas ASAP includes seven pillars:
Data security is a team sport—no single product addresses all aspects of security requirements. At Veritas, we partner with the best across the industry to optimize your investment by ensuring our products not only integrate well, but also stand up to cyber attacks.
The Cybersecurity and Infrastructure Security Agency (CISA) Joint Cyber Defense Collaborative (JCDC) initiative brings together government agencies, private sector organizations, and international partners to enhance cybersecurity collaboration, coordination, and information sharing. The JCDC: