cancel
Showing results for 
Search instead for 
Did you mean: 
Articles
cancel
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

Federal Service for Technical and Export Control (FSTEK)

The Federal Service for Technical and Export Control (FSTEK) certification is required in order to sell information security systems in Russia. The regulations covering these requirements were  introduced by the Russian government  in July 2011. Th...

Common Criteria

Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assura...

Federal Identity, Credential and Access Management - FICAM

Federal Identity, Credential and Access Management (FICAM) Trust Framework Solutions (TFS) The FICAM TFS (http://idmanagement.gov/trust-framework-solutions) is the federated identity framework for the U.S. Federal Government. It includes guidance,...

FedRAMP

Federal Risk and Authorization Management Program (FedRAMP) Symantec ProductStatusSymantec Validation and Identity Protection (VIP)In Progress The Federal Risk and Authorization Management Program, or FedRAMP, is a government-wide program (www.fe...

UK Cyber Essentials

UK Cyber Essentials Background:  From 1 October 2014, the UK government has made it mandatory that all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The s...

Global Certification Management Program Office

Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Sy...

Office of Public Sector Compliance - OPSC

The Office of Public Sector Compliance provides support, education, and communication to foster a culture of compliance and to enhance our collective ability to sell confidently into the public sector. VPAT™ (Voluntary Product Accessibility Templa...

FIPS 140-2 Requirements

Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Fed...

Corporate Responsibility in a Connected World

Symantec protects the world’s people and information by conducting our business with a commitment to ethical operation, promoting a diverse and inclusive workplace, practicing sound environmental management and investing in positive social impact a...

Customer Social Responsibility FAQs

Symantec protects the world's people and information by conducting our business with a committment to ethical operation, promoting a diverse and inclusive workplace, practicing sound environmental management and investing in positive social impact ...

Representations & Certifications

FAR and DFAR Representation and Certification Report Return to the Office of Public Sector Compliance Return to the Customer Trust Portal

randy_sefcik by Not applicable
Partner Employee
  • 903 Views
  • 0 comments
  • 0 kudos

Frequently Requested Information

This page contains our most frequently requested public facing documentation.  Users that have accepted our Non-Disclosure Agreement (NDA) may access confidential data such as ISO/IEC 27001 certifications, SOC reports and evidence of insurance on o...

How effective incident management retains market share

This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.  Particularly during the first few minutes and hours of a business disruption, an established incident management meth...

Tech Exchange Presentation: Mobile App Management

Mobile Device Management (MDM) is the first thing many companies think about when attempting to address mobility in the enterprise.  However, with the increasing popularity of BYOD, the restrictions of regulated industries, and other challenging mobi...

Tech Exchange Presentation: Mobile Protection

Managing mobile devices is all about protecting mobile data in all of the various places it is transmitted, stored and viewed. Unlike traditional PCs, mobile devices naturally communicate over channels that companies have no control over, and several...