JAMIS is one of the premier providers of software solutions tailored to the government contracting industry. This means that we take security very seriously. Whether it be JAMIS Prime ERP’s source code, the security controls we have in place, or the cloud servers that we host our applications on, we scrutinize every detail and ensure that we go above and beyond to help our customers meet all industry requirements and compliance standards.
Source Code Security
When purchasing software, customers and prospects are demanding to understand how secure the software is. As part of CA Veracode Verified, JAMIS Software Corporation can now demonstrate through a seal and provide an attestation letter from an industry leader that the application has undergone security testing as part of the development practice. Additionally, participating in the program ensures that JAMIS Prime ERP meets a high standard of application security, reducing risk for the customer.
With approximately 30 percent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers JAMIS to demonstrate its commitment to creating secure software.
Organizations that have their secure development practice validated, and their application accepted into the Standard Tier, have demonstrated that the following security gates have been implemented into their software development practice:
– Assesses first-party code with static analysis
– Documents that the application does not allow flaws in first-party code
– Provides developers with remediation guidance when new flaws are introduced
Security Controls
JAMIS has applied the required Risk Management Framework including conducting the activities of security categorization, security control selection and implementation, security control assessment, system authorization, and security control monitoring, and has taken the necessary steps in meeting data security standards and regulations of NIST SP 800-171 and DFARS 252.204-7012 for our customers.
Defense contractors routinely process, store and transmit sensitive federal information to assist federal agencies in carrying out their core missions and business operations. Federal information is also shared with state and local governments, universities and independent research organizations.
To keep this information secure, Executive Order 13556 established the Controlled Unclassified Information (CUI) Program to standardize the way the executive branch handles unclassified information that requires protection, such as personally identifiable information.
JAMIS has performed all of the mandatory procedures to meet the requirements of the Federal Information Security Modernization Act (FISMA) and meet or exceed the information security requirements established for executive agencies by the Office of Management and Budget (OMB) in Circular A-130, Appendix III, Security of Federal Automated Information Resources.
For more information about JAMIS, or our signature application JAMIS Prime ERP, you can take a look at our ongoing webinar series HERE. Visit our Security page on the JAMIS website HERE. Or contact us directly at info@jamis.com.