Resources

Curated content for the trust management expert. Get the latest on security trends, compliance frameworks, and Vanta news.

Show more filters

Latest

FedRAMP
Blog
From pilot to Moderate: Lessons from Vanta’s FedRAMP 20x journey

How Vanta Government Cloud achieved FedRAMP 20x Moderate, with key lessons.

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Company news
Blog
Vanta crosses $300M in ARR as growth accelerates

For years, security teams proved trust once a year during audits, and their customers accepted static PDFs. That era is over.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
Compliance
Blog
How to become PCI compliant in three steps

Being PCI compliant can mean different requirements for merchants and service providers. Learn how to become PCI compliant in three easy steps.

Compliance
Upcoming
On-demand
ISO 27001
Guide / Report
ISO 27001 compliance checklist

Our ISO 27001 compliance checklist will help simplify your path to compliance.

Compliance
Upcoming
On-demand
NIST
Blog
NIST CSF vs. ISO 27001: What’s the difference?

What is NIST CSF and how is it different from ISO 27001? Our security experts break down what you need to know.

Compliance
Cybersecurity
Features
Upcoming
On-demand
Security
Blog
Security policy templates: A key differentiator

In part three of our series on key differentiators in automated security platforms, we discuss the importance of policy templates. Learn how security policy templates can save you time, money, and a whole lot of headaches.

Compliance
Features
Upcoming
On-demand
SOC 2
Blog
Key differentiators: Automated employee offboarding and access management workflows

In part two of our series on key differentiators for choosing an automated compliance platform, we discuss the importance of automating employee offboarding and access management workflows.

Compliance
Cybersecurity
Features
Startups
Upcoming
On-demand
Compliance
Blog
What are the benefits of a PCI automated platform?

Getting PCI certified takes a lot of time and effort. Is there an easier way to get and stay compliant? Learn how an automated platform lightens a compliance certification workload and can streamline the process.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
How to get PCI compliant

Do you need to get PCI compliant but don't know where to start? Check out these steps on the best ways to get your PCI compliance up and running.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
Why companies that use Stripe still need PCI compliance

Stripe is PCI compliant, but does that mean companies that use Stripe don't need to worry about PCI? Learn about how to work with businesses that process payment information and steps to make sure your customers stay secure.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
PCI compliance for small businesses: What you need to know

Your small business needs to be PCI DSS compliant, but how do you even get started? Here's a quick intro for how to get your small business PCI compliant.

Compliance
Startups
Upcoming
On-demand
Compliance
Blog
Differentiator for automated compliance platforms: Visibility into vulnerabilities

Vulnerability scans are among the most critical pieces of SOC 2 compliance. In part 5 of our series on key differentiators for automated compliance platforms, we discuss the importance visibility and integrations for vulnerabilities.

Compliance
Features
Upcoming
On-demand
SOC 2
Blog
Key differentiators in security automation platforms: A series

Not all automated security platforms on the market are created equal. We've compiled a list of the biggest differentiators to look for when choosing an automated compliance platform. In part one, learn about how a documents tab and recurring evidence tasks are key performance enhancers for your organization.

Features
Compliance
Upcoming
On-demand
Compliance
Blog
Differentiator among compliance automation software: Risk assessment register

In part four of our series on key differentiators in security automation platforms, we discuss risk assessment management. Learn how you can simplify your annual risk assessments with a risk assessment register.

Risk Management
Compliance
Features
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.