New   Certinal Named A Leader in IDC MarketScape : Worldwide eSignature Software »

Security Compliance: Most exhaustive coverage of security compliance

ISO 27001:2013 #

SSAE SOC I and SOC II Type 2

arrow
arrow

Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.

Mentions internal controls capturing how a company safeguards customer data and how well those controls are operating.

aicapa-iso-spc

# Details related to encapsulated report shall be provided by Certinal

Trust Arc Asia-Pacific Economic Cooperation (APEC) Privacy Recognition for Processor (PRP) System Certification
 
arrow

PRP certification represents the requirements you must meet in order to be recognized as a qualified processor by data controllers.

Truste
3rd Party VAPT
arrow

VAPT is a term used to describe security testing that is designed to identify and help address cyber security vulnerabilities.

netsquare

Information Security Registered Assessors Program (IRAP) Certification

arrow

Comprehensive process for the independent assessment of a system’s security against Australian government policies and guidelines.

irap

ISO 9594-8

arrow

Specifies data objects used to represent the public-key certificates themselves, & revocation notices for issued public-key certificates that should no longer be trusted.

iso9594-8

FIPS 140-2

arrow

US and Canadian government standard that specifies the security requirements for cryptographic modules that protect sensitive information.

nist-fps-140-2

FIPS 186-4

arrow

The Standard specifies a suite of algorithms that can be used to generate a digital signature.

nist-fps-186-4

ISO 27001:2013 #

arrow down

Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.

aicapa-iso-spc

# Details related to encapsulated report shall be provided by Certinal

Trust Arc Asia-Pacific Economic Cooperation (APEC) Privacy Recognition for Processor (PRP) System Certification

arrow down
Truste

3rd Party VAPT

arrow down

VAPT is a term used to describe security testing that is designed to identify and help address cyber security vulnerabilities.

netsquare

Information Security Registered Assessors Program (IRAP) Certification

arrow down

Comprehensive process for the independent assessment of a system’s security against Australian government policies and guidelines.

irap

ISO 9594-8

arrow down

Specifies data objects used to represent the public-key certificates themselves, & revocation notices for issued public-key certificates that should no longer be trusted.

iso9594-8

FIPS 140-2

arrow down

US and Canadian government standard that specifies the security requirements for cryptographic modules that protect sensitive information.

nist-fps-140-2

FIPS 186-4

arrow down

The Standard specifies a suite of algorithms that can be used to generate a digital signature.

nist-fps-186-4
Certinal named a "Leader" in IDC MarketScape: Worldwide eSignature Software 2023
Certinal's Enterprise-Grade Security & Compliance