Features

Standards aligned policies.

Your security program begins with reviewing and adopting security policies. All policies map to NIST 800-53, so you can be confident going into any security discussion with your partners or customers.

From our decades of experience, we believe NIST 800-53 to be a great starting point for those that need PCI, HIPAA, SOC2, etc.

Policies screenshot

Security training.

A robust security program includes security training as a requirement. With securityprogram.io you have access to general security awareness training for your entire team — including phishing and data handling training.

We also provide you with policy specific training to help implement each new security policy. For those needing to build a more mature program, we also offer training for secure development, threat modeling, and more.

Training screenshot

Risk management tools.

securityprogram.io includes support for Application Inventories, Risk Registers, Asset Trackers, and a host of other risk management tools. But you won't be overwhelmed trying to fill everything out at once. Over the course of the program you'll be guided in filling out each of the templates one by one, in an order that makes sense, in lock-step with each new security policy you adopt.

Dashboard

Scanning.

Scanning is crucial to ensure the security of your environment. Your security program will include regular scans, with results reported directly to securityprogram.io. Or if you prefer, findings can be sent directly to your own issue tracking software.

Scan findings

Attestation letter.

Eventually your partners will ask for a letter of attestation regarding your company's security posture, and with securityprogram.io you'll be able to generate this letter on demand.

Attestation letter

Premium features.

At the upper tier, we offer auditing: we'll review your policies and supporting evidence, and provide you with a stronger assessment to share with 3rd parties. You'll have direct access to the Jemurai team, a more robust scanning process, and deeper discounts for our On Demand services (Pen Testing, Code Review, Threat Modeling, etc.).

Tier upgrade

Improve your security posture today.