JAMIS Software

Search Icon View Demo

MENUMENU
  • Products
        • JAMIS Prime ERPProduct Overview
          • Project Accounting & FinanceCost Accounting For Government Contractors
          • Time and Expense ManagementTimesheets, Time Off Management, and Expense Reporting
          • Customer Relationship Management (CRM)Opportunity Lifecycle Management
          • Asset ManagementFixed Assets, Depreciation, and Government Property Management
          • Contract ManagementContract Lifecycle Management
          • Business Planning SuiteBid & Proposal, Budgeting, and Forecasting
          • Distribution ManagementRequisitions, Purchasing, and Inventory Management
          • Dashboards & Business IntelligenceReal-time Reporting, Inquiries, & Dashboards
        • JAMIS HCMProduct Overview
          • Human Resources ManagementHR, Recruiting, Onboarding, Benefits, Compensation, and Learning
          • Payroll ManagementDomestic & International Payroll, & Outsourced Tax Services
        • Industry Specific EditionsProduct Overview
          • Manufacturing EditionProject Manufacturing built for federal government contractors
          • Nonprofit EditionGrant management for federally-funded nonprofits.
        • Company Size
          • Small Business
          • Enterprise BusinessScalable and full-featured solutions for mid-to-large organizations.
  • Services
    • Implementation Services & Consulting
    • Customer Support
    • JET - JAMIS Education & Training
    • JAMIS Cloud Services
    • System Customization
  • Resources
        • Get the JAMIS edge in Government Contracting

          JAMIS is a true cloud ERP system that breaks down barriers and helps drive collaboration and knowledge-sharing across your organization, so your people can do what they do best.

          Why JAMIS?
          DCAA Compliance
          Security

          Resources
          • Webinars & Videos mega menu arrow
          • Whitepapers mega menu arrow
          • Prime Insights Blog mega menu arrow
          • Datasheets mega menu arrow
          • Customers mega menu arrow
          FEATURED CONTENT
          JAMIS Prime 7.0 Release

          JAMIS Prime 9.0 Release

          JAMIS Software Corporation announces the launch of Version 9.0, delivering major enhancements in financials, manufacturing, mobility, and cybersecurity to help customers boost efficiency, collaboration, and control.

          Learn more mega menu arrow

  • Events
    • GovCon Webinar Series
  • Company
    • About JAMIS
    • Company News
    • Management Team
    • Partners & Affiliates
    • Careers
    • Office Locations
  • Contact Us

SECURITY

Related Posts

  • JAMIS’ Customer, Cask Government Services; One of Only Four Authorized as a CMMC Third Party Assessor Organization (C3PAO) by the CMMC-AB
  • JAMIS Customer Edwards Performance Solutions is the First Licensed Partner Publisher to Have Their Training Curriculum Accepted by the CMMC-AB
  • JAMIS Harnesses Power of Cyber Security Experts to Form CMMC Readiness Group

Webinars

ERP Security, the CMMC, and Navigating the Modern Landscape

Watch On-Demand Video

JAMIS Provides Enterprise-Grade Data Protection Solutions for GovCon

JAMIS is committed to providing the most secure code on the market, and that is why we are happy to disclose how we take care of our code. In addition, JAMIS Prime is the first ERP in the GovCon space to deliver built-in multi-factor authentication, increasing your protections against cyber criminals.

JAMIS believes in ensuring our team is doing the right thing with the security of your data and delivering a world class solution. Part of this commitment means having an independent expert validate our Security and Compliance posture.

JAMIS Security and Compliance:

FedRAMP and Cybersecurity Maturity Model Certification (CMMC)

At JAMIS Software Corporation, we recognize and are fully aware that the Department of Defense (DoD) has finalized Cybersecurity Maturity Model Certification (CMMC) compliance into law for federal contractors, with its implementation likely occurring by the end of this year. Understanding the significant impact this may have on your business, we have been diligently working over the past few years to develop and refine options to support our clients through this transition. We are committed to providing solutions that align with your cybersecurity compliance needs and help you navigate the evolving regulatory landscape.

As a cloud service provider, JAMIS is currently in the process of FedRAMP Moderate compliance, and expects to complete its assessment in July 2025.

SSAE-18 SOC 1 Type II

SSAE (Statements on Standards for Attestation Engagements) SOC (Service Organization Control) reports were created by the AICPA (American Institute of Certified Public Accountants) in order to set compliance standards and keep pace with the rapid growth of cloud computing and businesses outsourcing their services to third-party providers.

The SSAE 18 SOC 1 report focuses on a service provider’s processes and controls that could impact their client’s internal control over their financial reporting (ICFR).

Multi-Factor Authentication

The U.S. Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) will require that companies implement Multi-factor Authentication (MFA) to protect “controlled unclassified information” (CUI).  JAMIS Prime version 7.0 is the only GovCon ERP offering native Multi-Factor Authentication as a turnkey solution.  We think it’s essential that your organization take the necessary steps to keep your data safe and secure. With JAMIS, you only have to enable the feature, without the hassle of implementing a 3rd party tool.

Secure Code

With approximately 30 percent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers JAMIS to demonstrate its commitment to creating secure software. Organizations that have their secure development practice validated, and their application accepted into the Standard Tier, have demonstrated that the following security gates have been implemented into their software development practice:

- Assesses first-party code with static analysis
- Documents that the application does not allow flaws in first-party code
- Provides developers with remediation guidance when new flaws are introduced

JAMIS Listing in the Veracode Verified Directory: https://www.veracode.com/verified/directory

Explainer Video on Veracode: View Video

Responsible Disclosure of Bugs and Vulnerabilities

If you find a bug, vulnerability, or other flaw in any of our sites or Services, we encourage you to submit them to us. We have created a vulnerability disclosure page that describes this process.

facebook twitter youtube linkedin
Copyright © 2023 JAMIS Software Corporation. All rights reserved.
JAMIS Headquarters | 6688 Gunpark Drive, 2nd Floor, Boulder, Colorado 80301
Legal | Sitemap
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Reject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT