Show more filters

Latest

Product updates
Blog
New security capabilities for startups: Build enterprise-grade trust without compromising speed

Vanta’s security capabilities help startups build enterprise-grade trust at startup-level speed.

Company news
Events
VantaCon 2025

Join us in person in San Francisco on November 19.

Company news
Blog
Vanta is a Leader in the IDC MarketScape: Worldwide Governance, Risk, and Compliance Software Vendor Assessment, 2025

The IDC MarketScape assesses the competitive landscape, analyzing qualitative and quantitative criteria to evaluate GRC vendors.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
ISO 27001
Events
ISO 27001:2022 What's changed and what it means for your business

In late 2022, ISO 27001 rolled out changes to the Annex A controls, minor updates to the clause language, modernized controls, as well as 12 new controls. Whether you have ISO 27001 and want to learn more about these updates, or are pursuing ISO for the first time, this on-demand webinar is for you. Join Matt Cooper, Senior Manager of Privacy, Risk, and Compliance at Vanta, and Steve Conley, IT Audit Director at Insight Assurance, to dive in.

Compliance
Upcoming
On-demand
Company news
Blog
Vanta crosses 500 raving reviews on G2

Vanta has crossed 500 reviews on G2. We've highlighted just a few comments from our customers and how they tie into Vanta’s core values.

No items found.
Upcoming
On-demand
Compliance
Blog
How do you perform quarterly access reviews?

Periodic user access reviews prevent the risk that former employees may still retain access to sensitive corporate data and systems after being terminated. Learn how to perform quarterly access reviews.

Compliance
Cybersecurity
Features
Upcoming
On-demand
Company news
Blog
Reimagining the future of trust with Trustpage by Vanta

Vanta announced today its acquisition of Trustpage to transform trust into a marketable advantage for companies around the world.

Building Trust
Startups
Cybersecurity
Features
Integrations
Upcoming
On-demand
Security
Blog
What is vulnerability scanning?

What is vulnerability scanning and how can it enhance your information security? Find out everything you need to know from the Vanta security team.

Compliance
Cybersecurity
Upcoming
On-demand
SOC 2
Events
Convos with Customers: Envase

Envase knew gaining the trust of their potential customers was crucial, but were unsure if getting SOC 2 compliant was worth the hassle. Learn how Envase worked with Vanta to make the SOC 2 attestation process painless.

Compliance
Upcoming
On-demand
Security
Guide / Report
The complete guide to MVSP

What is MVSP? Learn how cutting edge companies have created a lightweight universal security starting point for B2B businesses.

No items found.
Upcoming
On-demand
Compliance
Guide / Report
AWS: Foundational Technical Review overview

AWS FTR describes the construction of secure, performant, resilient, sustainable, and cost-efficient cloud infrastructures. Read our overview to aid your comprehension.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
Do you need penetration testing for compliance?

Software Secured, a Vanta partner, gives an overview of penetration testing and the differences between prescriptive and descriptive compliance frameworks.

Compliance
Experts
Partners
Upcoming
On-demand
Security
Events
Coffee & Compliance: Demystifying access reviews

Join security experts Matt Cooper and Bart Tissue of Vanta as they discuss the importance of conducting regular access reviews in the newest episode of Coffee & Compliance.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Events
Convos with Customers: Explo

Learn how the co-founder of Explo, Gary Lin, uses Vanta to manage security and compliance at a quickly growing startup.

Compliance
Upcoming
On-demand
Security
Blog
What is an access review?

An access review describes the process of monitoring the rights and privileges of everyone who can interact with data and applications.

Cybersecurity
Risk Management
Features
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.