SECURITY
Related Posts
- News: JAMIS Achieves FedRAMP Moderate Equivalency: Link >
- Featured Article: Expect GovCon's Compliance Focus to Only Increase: Link >
- News: JAMIS Customer, Cask Government Services, Within First Four Authorized as CMMC C3PAO: Link >
- News: JAMIS Customer, Edwards Performance Solutions, First Licensed Publisher to Have Training Curriculum Accepted by CMMC-AB: Link >
- News: JAMIS Harnesses Power of Cybersecurity Experts to Form CMMC Readiness Group: Link >
Webinars
ERP Security, the CMMC, and Navigating the Modern Landscape
Watch On-Demand Video
JAMIS Software Corporation Achieves FedRAMP Moderate Equivalency, Delivering Federal-Grade ERP Security in the Cloud
With this designation, JAMIS Prime ERP is now fully authorized to handle Controlled Unclassified Information (CUI), satisfying the stringent security requirements of the Federal Risk and Authorization Management Program (FedRAMP). This milestone also strengthens JAMIS' support for organizations preparing for Cybersecurity Maturity Model Certification (CMMC) Level 2 certification, a critical requirement for companies working with the U.S. Department of Defense (DoD). Read Full Press Release »
JAMIS Provides Enterprise-Grade Data Protection Solutions for GovCon
JAMIS is committed to providing the most secure code on the market, and that is why we are happy to disclose how we take care of our code. In addition, JAMIS Prime is the first ERP in the GovCon space to deliver built-in multi-factor authentication, increasing your protections against cyber criminals.
JAMIS believes in ensuring our team is doing the right thing with the security of your data and delivering a world class solution. Part of this commitment means having an independent expert validate our Security and Compliance posture.
JAMIS Security and Compliance:
-
FedRAMP and Cybersecurity Maturity Model Certification (CMMC)
At JAMIS Software Corporation, we recognize and are fully aware that the Department of Defense (DoD) has finalized Cybersecurity Maturity Model Certification (CMMC) compliance into law for federal contractors. Understanding the significant impact this may have on your business, we have been diligently working over the past few years to develop and refine options to support our clients through this transition. We are committed to providing solutions that align with your cybersecurity compliance needs and help you navigate the evolving regulatory landscape.
JAMIS has recently achieved FedRAMP Moderate Equivalency for its application JAMIS Prime ERP and cloud infrastructure, after an assessment from Third-Party Assessment Organization (3PAO), Lunarline. With this designation, the JAMIS Prime ERP platform is now fully equipped to handle Controlled Unclassified Information (CUI), satisfying the stringent security requirements of the Federal Risk and Authorization Management Program (FedRAMP). This achievement also positions JAMIS to support customers in meeting Cybersecurity Maturity Model Certification (CMMC) Level 2 standards - critical for companies doing business with the U.S. Department of Defense.
-
SSAE-18 SOC 1 Type II
SSAE (Statements on Standards for Attestation Engagements) SOC (Service Organization Control) reports were created by the AICPA (American Institute of Certified Public Accountants) in order to set compliance standards and keep pace with the rapid growth of cloud computing and businesses outsourcing their services to third-party providers.
The SSAE 18 SOC 1 report focuses on a service provider’s processes and controls that could impact their client’s internal control over their financial reporting (ICFR).
-
Multi-Factor Authentication
The U.S. Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) will require that companies implement Multi-factor Authentication (MFA) to protect “controlled unclassified information” (CUI). JAMIS Prime version 7.0 is the only GovCon ERP offering native Multi-Factor Authentication as a turnkey solution. We think it’s essential that your organization take the necessary steps to keep your data safe and secure. With JAMIS, you only have to enable the feature, without the hassle of implementing a 3rd party tool.
-
Secure Code
With approximately 30 percent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers JAMIS to demonstrate its commitment to creating secure software. Organizations that have their secure development practice validated, and their application accepted into the Standard Tier, have demonstrated that the following security gates have been implemented into their software development practice:
- Assesses first-party code with static analysis
- Documents that the application does not allow flaws in first-party code
- Provides developers with remediation guidance when new flaws are introducedJAMIS Listing in the Veracode Verified Directory: https://www.veracode.com/verified/directory
Explainer Video on Veracode: View Video
-
Responsible Disclosure of Bugs and Vulnerabilities
If you find a bug, vulnerability, or other flaw in any of our sites or Services, we encourage you to submit them to us. We have created a vulnerability disclosure page that describes this process.