Security Announcement Critical Vulnerabilities Discovered in ConnectWise ScreenConnect
COMPLIANCE

Sarbanes-Oxley Act (SOX)

The Sarbanes-Oxley Act (SOX) is a United States federal law following large corporate and accounting scandals in the early 2000s. SOX intends to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises and improve corporate governance and accountability.

Compliance

Who Must Comply with SOX?

SOX applies to:

  • All publicly held American companies.
  • Any international companies with registered equity or debt securities with the U.S. Securities and Exchange Commission (SEC).
  • Any accounting firm or other third party that provides financial services to either of the above.

Publicly traded companies are required to ensure their internal business processes are appropriately monitored and managed to be SOX compliant. The consequences for non-compliance include fines or imprisonment, or both.

yellow icon arrow  right

Identify Permission Issues

Holm Security VMP allows for automated security testing to be conducted scheduled and on-demand. Automated monitoring tools allow for the identification of configurations and rule changes.

yellow icon arrow  right

Incident Reporting & Compliance

Reports can be produced on specific vulnerabilities for reporting. Keep event logs available for independent auditing and prove compliance for the past 90 days.

SOX Compliance Requirements

yellow icon user lock light

Security

Keep data secure and track attempted security breaches.

yellow icon magnifying glass

Audit

Secure event logs for independent auditing. 

yellow icon memo circle check light

Compliance

Prove compliance for the past 90 days

KEEP YOUR ORGANIZATION SECURE

Is Your Business at Risk of a Data Breach?

Maintaining a consistently updated and secure environment across the entire business can be difficult. Our Next-Gen Vulnerability Management Platform covers both technical and human assets so that you can discover, prevent, and respond to vulnerabilities effortlessly. Continuously educate employees on the latest cyber threats and find critical security gaps in your remote workforce, cloud systems, operational technology, and container environment. 365 days a year, 24 hours a day.