We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user experience, personalize content, customize advertisements, and analyze website traffic. For these reasons, we may share your site usage data with our social media, advertising, and analytics partners. By clicking ”Accept,” you agree to our website's cookie use as described in our Cookie Policy. You can change your cookie settings at any time by clicking “Preferences.”

TechDogs-"Nord Security Business Suite Products Have Passed Multiple Security Audits"

Cyber Security

Nord Security Business Suite Products Have Passed Multiple Security Audits

GlobeNewswire
Overall Rating

LONDON, Oct. 03, 2024 (GLOBE NEWSWIRE) -- Nord Security business products — NordStellar, NordPass, and NordLayer — successfully concluded multiple security audits last month.

NordStellar, the newest product by Nord Security, has successfully passed the SOC 2 Type 1 audit.

Launched in May 2024, NordStellar is a next-generation threat exposure management platform that helps businesses detect and respond to cyber threats, secure data access, safeguard accounts, prevent fraud, and mitigate the risk of ransomware attacks.

In addition, NordPass, a password manager for businesses, and NordLayer, a network access security service, passed the ISO/IEC 27001:2022 and SOC 2 Type 2 audits.

“Security audits are of utmost importance to us, and we are pleased to have completed this security assessment. At NordStellar, our mission is to develop a secure and easy-to-use tool that gives businesses insight into what hackers know about their company. Therefore, this independent audit was a crucial step toward achieving our goal — it will help us build an even more robust and reliable product,” says Vakaris Noreika, head of product at NordStellar.

What is SOC 2?

The SOC 2 report informs customers about the implementation of security controls of their chosen service. Typically, a SOC 2 audit conducted by an independent Certified Public Accountant (CPA) defines criteria for managing customer data based on five trust principles: security, availability, processing integrity, confidentiality, and privacy.

Based on these five pillars, SOC reports help users who need assurance about the vendor's controls relevant to the security, availability, and processing integrity of the systems it uses to process users' data and the privacy of the information processed by these systems. NordStellar has proven the trustworthiness of its products and the company's commitment to transparency with this standard.

ABOUT NORDSTELLAR

NordStellar is a threat exposure management platform that enables companies to detect and respond to cyber threats before they escalate. Available as a platform and API, NordStellar offers visibility into how threat actors work and what they do with compromised data. NordStellar was created by Nord Security, a globally recognized company behind one of the world's most popular digital privacy tools, NordVPN. For more information, visit nordstellar.com.

Contact:
Patricija Cerniauskaite
patricia@nordsec.com

First published on Thu, Oct 3, 2024

Liked what you read? That’s only the tip of the tech iceberg!

Explore our vast collection of tech articles including introductory guides, product reviews, trends and more, stay up to date with the latest news, relish thought-provoking interviews and the hottest AI blogs, and tickle your funny bone with hilarious tech memes!

Plus, get access to branded insights from industry-leading global brands through informative white papers, engaging case studies, in-depth reports, enlightening videos and exciting events and webinars.

Dive into TechDogs' treasure trove today and Know Your World of technology like never before!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. While we aim to provide valuable and helpful information, some content on TechDogs' site may not have been thoroughly reviewed for every detail or aspect. We encourage users to verify any information independently where necessary.

Join The Discussion

Join Our Newsletter

Get weekly news, engaging articles, and career tips-all free!

By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.

  • Dark
  • Light