• Close


    Government agencies make an enticing target for organized crime and cyber–espionage. Keeping public information and critical infrastructure secure, while complying with an ever–increasing number of regulations, can be challenging.

    Federal government agencies in the U.S. must comply with a number of cyber security standards, including the Federal Information Security Management Act (FISMA), the United States Government Configuration Baseline (USGCB), NIST 800–53, the Top 20 Critical Security Controls, and more. International, State and Local government agencies equally need effective security and to achieve compliance.

    Crimeware accounted for 51 percent of security incidents across public sector organizations.
    Verizon 2015 Data Breach Investigations Report

    Compliance gaps are a good starting point – it can really give your suggestions some teeth if you tie security failures to actual financial loss. Being able to inform compliance with clear, prioritized action plans is essential, and a big part of how I use Nexpose and Metasploit.

    Bob Jones
    Information Security Manager, City of Corpus Christi

    Simplify your compliance effort

    Simplify your compliance effort

    Nexpose is Common Criteria certified to Evaluation Assurance Level 3 Augmented (CC EAL3+), the highest level available. Nexpose and AppSpider provide built–in compliance capabilities to help you perform security audits in line with SCAP and stay compliant with government standards such as FISMA, USGCB and NIST 800–53.

    Reduce exposure to critical threats

    Reduce exposure to critical threats

    Continuously monitor your physical, virtual, cloud and mobile environments with Nexpose to gain real–time visibility into vulnerabilities, configurations and controls for managing risk. After remediation, you can use Metasploit to simulate an attack and verify the effectiveness of your controls.

    Learn more about Metasploit for Federal Government.
    Find the attacks you're missing

    Find the attacks you're missing

    Intruders are able to stay undetected on networks for an average of 205 days (Mandiant Threat Report 2015). During this time, attackers are looking for valuable information to steal. Monitor activity from the endpoint to the cloud with InsightUBA UserInsight, enabling you to quickly detect an attack and stop the breach before damage is done.

    Nexpose for Government

    Know your weak points and prioritize what matters most

    FISMA Compliance Webcast

    Discover simple steps to enable FISMA compliance

    Download Now

    FISMA Compliance Guide

    Learn the requirements and steps in becoming FISMA compliant

    Download Now