StateRAMP Authorized Products
StateRAMP establishes common security criteria to standardize cloud security verification.
To manage cyber risk and protect critical data, systems, and infrastructure from cyber-attacks and ransomware, it is recommended that state and local governments verify the cybersecurity posture of their cloud solution providers.
What this means for Service Providers:
This standardized approach allows providers serving governments to verify their security posture and prove their cybersecurity compliance to their government clients.
What this means for Governments:
StateRAMP’s shared resource model and continuous monitoring simplifies cloud compliance and risk management for government agencies who participate with StateRAMP.
Authorized Product List
Verified offerings with a security status of Ready, Provisional, or Authorized are listed on the Authorized Product List (APL) below. The APL was first published September 14, 2021, and is updated at the end of every business day.
To be verified, the provider must meet minimum security requirements and provide an independent audit conducted by a Third Party Assessment Organization (3PAO). StateRAMP recognizes three verified statuses, including Ready, Provisional, and Authorized. Ready products meet minimum requirements; Provisional products exceed minimum requirements and have a government sponsor; Authorized products satisfy all requirements and have a government sponsor. To ensure ongoing security compliance and risk mitigation, providers must comply with continuous monitoring requirements to maintain a verified security status.
|Company||Product Name||Security Status||Service Model||Impact Level||Sponsors||Ready Date:||Authorization Date:||3PAO:||Point Of Contact:||Contact Email:||Sponsor Names:||Service Description:|
|BlackBerry||BlackBerry Cloud - AtHoc Services for Government (ACSforGov)||Authorized||SaaS||Moderate||1||2021-12-13||2022-05-20||Kratos||Rashad Munawarfirstname.lastname@example.org||StateRAMP Approvals Committee||BlackBerry’s AtHoc is a networked crisis communication platform enabling corporations and government agencies to communicate and collaborate securely with their personnel and with other organizations through multiple devices during times of crises. BlackBerry’s AtHoc platform addresses critical communications needs including: Account: AtHoc Account enables real-time visibility into location and status for effective personnel accountability and crisis handling before, during, and after emergencies. This integrated approach to personnel accountability enables inputs from managers about their team, call center operators, data streams from HR and travel systems, as well as self-reporting by individuals. Alert: AtHoc Alert provides a comprehensive crisis communication solution that unifies all channels and devices, empowering organizations, people, and communities to collaborate during critical events. AtHoc’s flexible deployment options safeguards important personal information and enables enterprise-level command and control. Connect: AtHoc Connect empowers organizations to create their own permission-based network to establish interoperable communication and information sharing with organizations in their community. Collect: AtHoc Collect empowers your personnel in the field to be the "eyes and ears" of the operations center. AtHoc Collect enables on-scene personnel to report events, work progress, along with rich geo-tagged media that are worth a thousand words.|
|BlackBerry||BlackBerry CylanceProtect & CylanceOptics||Authorized||SaaS||Moderate||1||2022-01-10||2022-06-29||Booz Allen Hamilton||Rashad Munawaremail@example.com||StateRAMP Approvals Committee||BlackBerry’s CylanceProtect redefines what antivirus (AV) can and should do for your organization by leveraging artificial intelligence to detect and prevent malware from executing on your endpoints in real time. By taking a mathematical approach to malware identification utilizing patent-pending, machine learning techniques instead of reactive signatures and sandboxes, BlackBerry’s CylanceProtect renders new malware, viruses, bots and unknown future variants useless. BlackBerry’s CylanceProtect has developed the most accurate, efficient and effective solution for preventing advanced persistent threats and malware from executing on your organization’s endpoints. At the core of BlackBerry’s CylanceProtect unprecedented malware identification capability is a revolutionary machine learning research platform that harnesses the power of algorithmic science and artificial intelligence. It analyzes and classifies hundreds of thousands of characteristics per file, breaking them down to an atomic level to discern whether an object is “good” or “bad” in real time. BlackBerry’s CylanceOptics, part of the prevention-first BlackBerry’s CylanceProtect Security Platform, is an artificial intelligence (AI) driven endpoint detection and response (EDR) solution designed to extend the prevention delivered by BlackBerry’s CylanceProtect through root cause analysis, scalable threat hunting, and automated threat detection and response without increasing costs or security team workloads. BlackBerry’s CylanceProtect and BlackBerry’s CylanceOptics are managed through a single web interface within the FedRAMP boundary, and both capabilities are included in the BlackBerry’s CylanceProtect and CylanceOptics cloud service offering.|
|Box, Inc.||Box Enterprise Cloud Content Collaboration Platform||Authorized||SaaS, PaaS||Moderate||1||2022-05-19||2022-06-16||Schellman & Company||Brett Foxfirstname.lastname@example.org||Los Angeles City Employees' Retirement System (LACERS) ||The Box Enterprise Content Cloud Collaboration Platform enables business to easily share, manage and secure their content. In today’s mobile-first, cloud-first world, providing employees with secure access to content at any time using any device is critical to creating a more productive, connected workforce and improved customer experiences. Beyond secure file sharing, Box enables easy access to content and collaboration tools from any device with the security, scalability and administrative controls that IT requires.|
|Continuum GRC, Inc.||Continuum GRC ITAM||Authorized||SaaS||Moderate||1||2022-02-11||2022-04-26||Securisea||Michael Petersemail@example.com||StateRAMP Approvals Committee||Auto-mapped standards, automated documentation, real-time status, risk & maturity. When it comes to Compliance Cartography, no one is more comprehensive, secure and automated, saving you time, trouble and money. Serving the enterprise to the start-up community. Continuum GRC is a software as a service (SaaS) product that is purpose built for users who perform audit & compliance assessments, risk assessment & risk management, governance & policy development, and all other manner of audits and assessments.
Continuum GRC modules include support for the world’s frameworks, including NIST 800-53. DoD SRG, CMMC, 800-171, 800-66, 800-30, FedRAMP, StateRAMP, CJIS, DFARS, HIPAA, ITRM, AICPA SOC 1, SOC 2, GDPR, ISO 27001, NERC CIP, EUCS, C5, PCI DSS, LADMF and hundreds of others.
In addition to pre-configured questionnaires, assessment modules, and forms, the Continuum GRC ITAM SaaS application has creation tools that provide drag-n-drop easy custom creation for system administrators to construct their own assessment modules in 26 languages. Real time reports on Compliance Status, Risk Scores, Maturity Scores, workflows, tasking records, evidence management, and historical performance helping you stay proactive; not reactive.
Use Continuum GRC to replace existing tools, templates, and manual processes in place to support internal compliance and GRC requirements. The automation of Continuum GRC reduces manual labor, complexity of and between frameworks, produces reports, SSPs, POA&Ms, graphics, dashboards, and related outputs all sustained over the entire lifecycle of the program all within a single view with a unified source for governance, risk and compliance that supercharges performance and eliminates complexity. For a complete list of features and capabilities, please visit https://continuumgrc.com/subscription-options/
|Project Hosts, Inc.||Project Hosts Federal Private Cloud||Authorized||PaaS||Moderate||1||2021-09-10||2022-06-27||Coalfire Systems||Joshua Kruegerfirstname.lastname@example.org||StateRAMP Approvals Committee||The Federal Private Cloud (FPC) is a General Support System (GSS) is composed of systems and services that manage access control, authentication, auditing, monitoring, scanning, patching, configuration management, malware prevention, intrusion prevention, incident response, backup, and disaster recovery for each Application deployed on the FPC.|
|SMX||Cloud Assured Managed Services (CAMS)||Authorized||PaaS||Moderate||1||2021-11-08||2022-05-20||Coalfire Systems||Razaq Ahmedemail@example.com||StateRAMP Approvals Committee||The SMX Cloud Assured Managed Services (CAMS) solution gives an organization the ability to leverage the power and scalability of the cloud while reducing the cost and complexity of managing and monitoring cloud solutions in-house. CAMS has been designed to deliver the flexibility customers demand from today’s cloud managed service providers.|
|TalaTek||TalaTek intelligent Governance and Risk Integrated Solution (TiGRIS)||Authorized||SaaS||Moderate||1||2022-03-03||2022-04-28||Earthling Security||Johann Dettweilerfirstname.lastname@example.org||StateRAMP Approvals Committee||The TiGRIS SaaS manages a customer’s information system requirements through the life cycle of its initial security assessment and then throughout the ongoing continuous monitoring of the set of security standards and controls selected by the customer. The TiGRIS application was developed in-house, by TalaTek developers and was designed, by TalaTek, to deliver its Governance, Risk Management and Compliance (GRC) services.|
|Tenable||Tenable.io||Authorized||SaaS||Moderate||1||2022-02-11||2022-05-09||EmagineIT||InfoSec-Complianceemail@example.com||Owen Zorge, City of Chandler, Arizona||Tenable.io is a risk-based vulnerability management platform. Built on an open and elastic platform, it continuously tracks and assess known and unknown assets and their vulnerabilities in your environment to provide a risk-based view of your entire attack surface- from IT to cloud and web applications. Powered by Nessus technology, Tenable.io provides the industry's most comprehensive vulnerability coverage with the ability to understand your cyber risk and predict which vulnerabilities you need to remediate first. Its streamlined and intuitive user experience, gives you immediate insight with intuitive dashboards to quickly deliver value and help your team identify, investigate and prioritize vulnerabilities.|
|Zoom||Zoom for Government||Authorized||SaaS||Moderate||1||2022-02-11||2022-07-12||Schellman and Company, LLC||Christina Gathfirstname.lastname@example.org||Sacramento County, California||The Zoom For Government Platform unifies cloud video conferencing, cloud phone system, messaging, simple online meetings, and a software-defined conference room solution into one easy-to-use platform. The solution offers video, audio, phone, and wireless screen-sharing across Windows, Mac, Linux, Chrome OS, iOS, Android, Blackberry, Zoom Rooms, and H.323/SIP room systems. Zoom Products include:
Zoom Cloud Video Conferencing – a cloud-based collaboration service which includes video, audio, content sharing webinars and collaboration.
Zoom Phone - a cloud-based phone system with traditional PBX features, integrated PSTN connectivity, enhanced emergency services, and support for calling from mobile apps, desktop apps, and legacy desk phone devices.
Zoom Chat - send chat messages in public or private channels organized by projects, teams, or topics with the ability to share files, emojis, screenshots, and more.
Zoom Rooms – software-based group video conferencing for conference and huddle rooms that run off-the-shelf hardware including a dedicated MAC or PC, camera, and speaker with an iPad controller.
Zoom Room Connector – a gateway allowing H.323 and Session Initiation Protocol (SIP) systems to connect to Zoom meetings. Room Connector is available in both cloud computing and as software (VM) for installation on the customer premise.
Zoom Meeting Connector – a software (VM) version of the Zoom Cloud infrastructure intended for installation on the customer premise.
Zoom API - provides the ability for developers to easily add Video, Voice and Screen Sharing to your application. Our API is a server side implementation designed around REST. The Zoom API helps manage the pre-meeting experience such as creating, editing and deleting resources like users, meetings and webinars.
|TTEC||Humanify Enterprise||Ready, Federal JAB||SaaS||Moderate||0||2021-10-15||Coalfire Systems||Kip Jamesemail@example.com||The TTEC Humanify Enterprise - G is an OmniChannel Contact Center as a Service solution that enables routing of Voice, eMail, Chat, Artificial Intelligence, and SMS interactions between citizens and government entities.|
|Aurigo Software Technologies Inc.||Masterworks Cloud and Aurigo Essentials||Ready||SaaS||Moderate||0||2021-10-15||The Cadence Group||Vivek Siddegowdafirstname.lastname@example.org||The Aurigo Masterworks Cloud is an integrated suite of enterprise software products for owners to plan, build, and maintain large capital assets, infrastructure, and facilities. Aurigo Essentials is an all-in-one product for small to mid-size agencies with easy-to-deploy and industry-ready configurations.|
|Avaya||Avaya OneCloud for Government||Ready||SaaS||Moderate||0||2021-11-05||Coalfire Systems||Lodovico Loquercioemail@example.com||Full UcaaS offering including audio/video conferencing and audio contact center.|
|BlackBerry||BlackBerry Government Mobility Suite (BGMS)||Ready||SaaS||Moderate||0||2021-12-03||Kratos||Rashad Munawarfirstname.lastname@example.org||BlackBerry Government Mobility Suite (BGMS) is a cloud-based endpoint management solution. BGMS provides customers the ability to utilize a single, integrated view of users, devices, applications, and policies within their IT environment. Customers can use BGMS to unify multi-OS endpoints across all ownership models while securing sensitive data. BGMS is deployed in Microsoft Azure FedRAMP approved Government cloud as a multi-tenant, government-only community cloud deployment model. The BGMS architecture will serve as the baseline infrastructure for BlackBerry FedRAMP authorized productivity applications such as BlackBerry Work and BlackBerry Workspaces; these solutions will provide mobile access to key business tools like email, calendars, contacts, and tasks as well provide secure access to enterprise file repositories.|
|Dynatrace||Dynatrace for Government||Ready||SaaS||Moderate||0||2022-07-26||Schellman and Company, LLC||Rush Modiemail@example.com||Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation. With automatic and intelligent observability at scale, our all-in-one platform delivers precise answers about the performance and security of applications, the underlying infrastructure, and the experience of all users to enable organizations to innovate faster, collaborate more efficiently, and deliver more value with dramatically less effort.|
|Innovative Discovery, LLC||Innovative Discovery Government Cloud||Ready||SaaS, IaaS||Moderate||0||2022-08-02||Lunarline||Jamie Neilonfirstname.lastname@example.org||The Innovative Discovery Government Cloud (ID Gov-Cloud) is a Software as a Service (SaaS) offering that provides a secure and scalable environment for government legal document services. ID Gov-Cloud provides software services to agencies within a secure, scalable, and compliant cloud environment, offering Relativity Analytics, and iCONECT Analytics inhouse – as well as expert consulting and application to get the most from them. Agencies can leverage the full scope of eDiscovery services within one scalable platform, to include but not limited to: processing, document review, advanced analytics, assisted review, legal hold services, and production.|
|Knowledge Services||dotStaff||Ready||SaaS||Moderate||0||2021-09-13||A-Lign||Dave Stengeremail@example.com||Knowledge Services dotStaff™ is a Software as a Service (SaaS) offering that includes a Vendor Management System and a Survey Management module.|
|OCLC||WorldShare Management Services||Ready||SaaS||Low||0||2021-09-29||Schellman and Company, LLC||Anthony Fisicfirstname.lastname@example.org||OCLC is a nonprofit global library organization. Through OCLC, member libraries cooperatively produce and maintain WorldCat, the world’s most comprehensive global network of data about library collections and services.|
|Okta||Okta IDaaS||Ready||SaaS||Moderate||1||2021-11-19||Schellman and Company, LLC||Mark Forreideremail@example.com||State of Arizona||The Okta IDaaS Regulated package includes a number of components that may be used to provide methods of authentication and provisioning control including Okta core, Okta Mobile, Okta Verify, Okta Directory Agent, and Okta IWA Agent.|
|Quzara, LLC||Cybertorch||Ready||SaaS, PaaS||High||0||2022-07-25||Schellman & Company, LLC||Saif Rahmanfirstname.lastname@example.org||Quzara Cybertorch™ (Cybertorch) is a Managed Detection and Response (MDR) Platform providing Soc-As-A-Service (SocaaS). The system is intended solely for use by United States Federal, State, Local, and Tribal Governments, Government Consultants, and Federally Funded Research and Development Centers (FFRDC) (referred to throughout the following sections as “customers”) delivered through a Government Community Cloud Deployment Model. Cybertorch delivers Managed Vulnerability Management and Security Monitoring solutions and services. The security monitoring capabilities extend to cloud, datacenters, on-premises, IoT, OT signals converging to a single correlation, aggregation and analysis fusion capability driven and built on Zero trust principles, purpose-built to FedRAMP HIGH and DoD Security Requirements Guide (SRG). These services are delivered through a Platform which leverages components of Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) as defined in NIST SP 800-145 (NIST Definition of Cloud Computing. Cybertorch services and security architecture are based on Zero Trust Architecture principles described in NIST SP 200-207 (Zero Trust Architecture) for Enclave-based deployments and Enhanced Identity Government. Further, concepts of control plane and data plane are used throughout the architecture to segregate and isolate customers data.
Building on these security and trust architecture concepts, Cybertorch’ s unified platform allows the delivery and support of full end to end security coverage utilizing in-house security analysts along with Artificial Intelligence engines. Cybertorch provides managed Security Operations Services providing prevention, detection, and remediation services for the Customer. Cybertorch is supported by an enterprise-class cloud computing architecture that is delivered on the Government regions of Azure Infrastructure-as-a-Service (IaaS) platform.
|Wellspring||Sophia Knowledge Management System||Ready||SaaS||Moderate||0||2022-06-30||Lunarline||Matthew Hamiltonemail@example.com||Wellspring Knowledge Management System (Sophia) is a Software-as-Service (SaaS) solution designed to manage technology transfer operations and knowledge asset tracking for those working in the area of research and innovation. The product services solutions within intellectual property (patent) management, licensing and contract management, invention and ideas disclosure, along research and development (R&D) portfolios and project management.
The data in the system is typically directly entered by users and includes storage of various metadata around invention, patents, projects, contracts, and contacts associated with those records. Users may supplement these with uploaded notes, related files, workflow status, financial information, contract terms and other information that is critical to the tracking of the end users portfolio. Key functional areas of the system are:
idea disclosure from researchers and inventors.
evaluation of inventions and Intellectual property protection
support of patent prosecution and monitoring
tracking contracts and technology licensing terms
financial management of patent expenses and licensing revenue
compliance with contract terms and invention reporting
project and portfolio management
|Workday||Workday Government Cloud||Ready||SaaS||Moderate||0||2021-12-08||Coalfire Systems||Leigh Ann Montgomeryfirstname.lastname@example.org||Workday is a provider of enterprise applications for financial management, human capital management, planning, and analytics. Workday Government Cloud is a multi-tenant public cloud-based offering for U.S. federal, state and local government customers, as well as U.S. government contractors, and Federally Funded Research and Development Centers (FFRDCs). It comprises the following enterprise management cloud applications: Workday Core Financial Management, Projects, Project Billing, Expenses, Procurement, Inventory, Grants Management, Human Capital Management, Cloud Connect for Benefits, Payroll for the United States, Cloud Connect for Third-Party Payroll, Time Tracking, Recruiting, Prism Analytics, and Student. Also available is Workday Success Plans, a subscription-based success package that provides education, tools, and expertise to help agencies maximize their use of Workday.|
|Lookout Inc.||Lookout Security Platform||Authorized, Federal JAB||SaaS||Moderate||1||2021-10-26||2022-01-28||Schellman and Company, LLC||Kimberly Snowemail@example.com||Travis County, Texas||Lookout Mobile Endpoint Security is an enterprise-grade mobile security solution that provides comprehensive risk management across mobile devices, including iOS and Android, to secure against application, device, and network-based threats while providing visibility and control over data leakage. The Lookout Mobile Endpoint Security suite enables government agencies to secure the organization from mobile threats, identify and control non-compliant mobile apps that pose data leakage risks, and gain visibility into mobile endpoints. Lookout empowers government agencies to adopt secure mobility across personal and GFE devices without compromising productivity.|
|Microsoft||Microsoft Azure||Authorized, Federal JAB||SaaS||High||1||2021-12-15||2022-04-25||Kratos||John Gallagherfirstname.lastname@example.org||State of Arizona, Department of Homeland Security||Microsoft Azure is a cloud platform with more than 200 products and cloud services designed to help deliver solutions across different deployment scenarios – Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Microsoft Azure supports more than 90 compliance standards including FedRAMP High.|
|Microsoft||Microsoft Azure Government||Authorized, Federal JAB||SaaS||High||1||2021-12-15||2022-04-25||Kratos||John Gallagheremail@example.com||State of Arizona, Department of Homeland Security||Microsoft Azure Government is a separate cloud platform to support US federal, state, local, and tribal government agencies. It can support data that’s subject to the CJIS Security Policy and IRS Publication 1075 along with FedRAMP High and other compliance standards. Microsoft Azure Government is delivered through separate datacenters with physical, logical, and network isolation from the commercial cloud and is operated by US persons who have passed fingerprint-based background checks performed by the states.|
|Microsoft||Microsoft Dynamics 365||Authorized, Federal JAB||SaaS||High||1||2021-12-15||2022-04-25||Kratos||John Gallagher||jogallag@microsoft||State of Arizona, Department of Homeland Security||Microsoft Dynamics 365 is the next generation of intelligent business applications that enable organizations to grow, evolve, and transform. These applications enable organizations to quickly deliver new purpose-built applications that work seamlessly together to help manage mission-critical functions. Microsoft Dynamics 365 supports more than 90 compliance standards including FedRAMP High.|
|Microsoft||Microsoft Dynamics 365 US Government||Authorized, Federal JAB||SaaS||High||1||2021-12-15||2022-04-25||Kratos||John Gallagher||jogallag@microsoft||State of Arizona, Department of Homeland Security||Microsoft Dynamics 365 US Government is the next generation of intelligent business applications that enable US federal, state, local, and tribal government organizations to grow, evolve, and transform. It’s delivered through separate datacenters with physical, logical, and network isolation from the commercial cloud, is operated by US persons who have passed fingerprint-based background checks performed by the states, and can support data that’s subject to the CJIS Security Policy and IRS Publication 1075 along with FedRAMP High and other compliance standards.|
|Zscaler||Zscaler Internet Access - Government (Secure Web Gateway - vTIC)||Authorized, Federal JAB||SaaS||Moderate||1||2021-09-10||2022-01-28||Schellman and Company, LLC||Bradley Josephsfirstname.lastname@example.org||State of Arizona Department of Homeland Security||Zscaler Internet Access delivers your security stack as a service from the cloud, eliminating the cost and complexity of traditional secure web gateway approaches.|
|Zscaler||Zscaler Private Access - Government (Zero Trust Networking - VPN Replacement)||Authorized, Federal JAB||SaaS||High||1||2021-09-10||2022-03-18||Schellman and Company, LLC||Bradley Josephsemail@example.com||State of Arizona Department of Homeland Security||Zscaler Private Access solves the challenges posed by a traditional VPN infrastructure by decoupling your internal assets and applications from the limitations, cost, and complexity of direct IP network connections.|
Progressing Product List
|Company||Product Name||Security Status||Service Model||Impact Level||Sponsors||Ready Date:||Authorization Date:||3PAO:||Point Of Contact:||Contact Email:||Sponsor Names:||Service Description:|
|AINS||eCase||Pending||SaaS||Moderate||0||Fortreum||Srinivas||Sristy||AINS’ dynamic case management platform, eCase, is a complete automated information management, tracking, and reporting solution. eCase provides a means of swift but controlled collaboration and oversight between multiple users, simultaneously allowing for increased productivity while decreasing human error. However, for collaboration to be truly dynamic it has to be scalable and without boundaries. eCase can be deployed enterprise-wide so that users from multiple offices and scattered locations can collaborate at whatever respective level of input is required, from an approval signature to a grammar correction. eCase PaaS has multiple modules (applications) like Correspondence, HR, ER/LR, Foiaxpress, PAL. Foiaxpress collaboration, eCase portal ,Audit, Investigation, ARCATS,Workers compensation and Telework.|
|Blackboard||Blackboard Learn SaaS||Pending||SaaS||Moderate||0||A-Lign||Andrew Keeneyfirstname.lastname@example.org||Blackboard's Learn SaaS solution offers government and military agencies next-generation online, social and mobile tools that create a continuous learning environment, built around peer-to-peer interaction, content, and discussions|
|Google Services||Pending||IaaS, PaaS, SaaS||High||1||Coalfire Systems||Rodney Nelsonemail@example.com||Arizona Department of Homeland Security||Google Services is comprised of Google’s multi-tenant public cloud Google Cloud Platform and built atop the Google Common Infrastructure. The Google Common Infrastructure powers Google worldwide.|
|Microsoft||Microsoft Office365||Pending||SaaS||High||0||Coalfire Systems||Shawn Veneyfirstname.lastname@example.org||State of Arizona||Office 365 combines the Microsoft Office desktop suite with cloud-based versions of Microsoft's next-generation communications and collaboration services—including Microsoft Exchange Online, Microsoft Teams, and Office for the web. Microsoft Office 365 supports many compliance standards including FedRAMP Moderate.|
|Microsoft||Microsoft Office365 Government Community Cloud||Pending||SaaS||High||0||Coalfire Systems||Shawn Veneyemail@example.com||Office 365 Government Community Cloud is built for US federal, state, local, and tribal government organizations and combines the Microsoft Office desktop suite with cloud-based versions of Microsoft's next-generation communications and collaboration services—including Microsoft Exchange Online, Microsoft Teams, and Office for the web. Microsoft Office 365 Government Community Cloud can support data that’s subject to the CJIS Security Policy and IRS Publication 1075 along with FedRAMP Moderate and other compliance standards.|
|ORock Technologies, Inc.||ORockCloud||Pending||IaaS||Moderate||0||Schellman and Company, LLC||Abigail Halderfirstname.lastname@example.org||This secure, open source cloud provides a highly scalable, bi-coastal environment with elastic, on-demand access to computing, storage, virtualization, networking, performance monitoring, and applications in ORock’s service catalog.|
|Proofpoint, Inc.||Proofpoint Email and Information Protection Service||Pending||SaaS||Moderate||0||Schellman||Tariq Iqbalemail@example.com||The Proofpoint Email and Information Protection Service is a powerful cloud email security service that integrates threat protection, virus protection, spam detection, message encryption, data loss prevention (DLP), and digital asset protection technologies into an extensible message management platform. The service is designed to fit easily into existing messaging infrastructure, providing efficient performance, accurate message analysis, and a web-based interface for reporting, configuration, and management tasks.|
|Proofpoint, Inc.||Proofpoint Targeted Attack Protection||Pending||SaaS||Moderate||0||Schellman||Tariq Iqbalfirstname.lastname@example.org||Proofpoint Targeted Attack Protection (TAP) helps detect, mitigate, and block advanced threat that target people through email. It detects both known and new, never-before-seen attacks that use malicious attachments and URLs to install malware on a device or trick users to share their passwords or other sensitive information.|
|VMware||WorkSpace One||Pending||SaaS||Moderate||0||Coalfire Systems||Joe Witlesemail@example.com||VMware Workspace ONE® is a FedRAMP Moderate Authorized solution, providing a digital workspace platform that combines endpoint device deployment and management with secure Zero Trust Access for agencies & branches.
Consistently ranked as a leader by industry analysts, Workspace ONE delivers consumer-simple, single sign-on (SSO) access to cloud, web, and Windows apps in one unified catalog that engages employees. Agencies can enable employees with a broad range of devices including iOS, Android, Mac, Windows and rugged devices to meets the needs or preferences of a user or their mission while enforcing fine-grained, conditional access policies that also take into account device compliance information delivered by unified endpoint management (UEM) technology.
The Workspace ONE FedRAMP environment now includes ‘Workspace ONE Access’, (formerly VMware Identity Manager), which provides multi-factor and derived credentials authentication, conditional access and single sign-on to SaaS and web apps, and Workspace ONE Intelligent Hub, which offers a unified catalog, actionable notifications of potential interest to employees, and a people directory for a full digital workspace experience.
|VMware||VMC on AWS GovCloud||Pending||IaaS||High||0||Coalfire Systems||Joe Witlesfirstname.lastname@example.org||VMware Cloud on AWS GovCloud (US) brings VMware’s rich Software-Defined Data Center software to the AWS GovCloud (US) Region, and enables U.S public sector agencies to securely run production applications across VMware vSphere®-based private, public and hybrid cloud environments, with optimized access to AWS services. Jointly engineered by VMware and AWS, this on-demand service enables IT teams to seamlessly extend, migrate and manage their cloud-based resources with familiar VMware tools – without the hassles of learning new skills or utilizing new tools. VMware Cloud on AWS GovCloud (US) integrates VMware’s flagship compute, storage and network virtualization products (VMware vSphere®, VMware vSANTM and VMware NSX®) along with VMware vCenter® management as well as robust disaster protection, and optimizes it to run on dedicated, elastic, Amazon EC2 bare-metal infrastructure that is fully integrated as part of the AWS GovCloud (US). This service is delivered, sold and supported by VMware and its partners. With the same architecture and operational experience on-premises and in the cloud, IT teams can now quickly derive instant business value from use of the AWS and VMware hybrid cloud experience.|
|ZibaSec||PhishTACO||Pending||SaaS||Moderate||0||Coalfire Systems||Julie Davilaemail@example.com||ZibaSec PhishTACO is a cloud-based SaaS solution that enables organizations of all sizes to accurately assess their risk levels using sophisticated email phishing campaigns.|
|Appian||Appian||In Process||PaaS||Moderate||0||Coalfire||Thomas Simmonsfirstname.lastname@example.org||Appian software is delivered to the Appian Cloud through a Platform-as-a-Service (PaaS) model and leverages cloud-native robotic process automation (RPA), simplifying control management and reducing overhead for customers. Government agencies should consider the Appian Government Cloud (at Impact Level 5) for critical acquisitions, case management and logistics, especially when process and business rule complexities are high. The Appian Low-Code Platform unifies the key capabilities needed to get work done faster.|
|AvePoint, Inc.||AvePoint Online Services for US Government||In Process||SaaS||Moderate||0||Lunarline||Lauren Darnisemail@example.com||vePoint Online Services for US Government is the industry’s first and only 100 percent Microsoft Azure-based Software-as-a-Service (SaaS) platform for Office 365 MT. Requiring no installation or agents, AvePoint Online Services for US Government provides centralized management, governance, backup, reporting and ECM/records management for your Office 365 MT environments.|
|Boomi||AtomSphere||In Process||SaaS||Moderate||0||Schellman and Company, LLC||Cameron Hass||Cameron_hass@dell.com||Boomi AtomSphere is a cloud-native integration Platform-as-a-Service (iPaaS) technology that lets you connect everyone to everything. The Boomi SaaS AtomSphere Platform solves the needs of our government customers with end-to-end capabilities by integrating applications, systems, and connecting people.|
|CGI||CGI US Cloud||In Process||IaaS||Moderate||1||A-Lign||Rosemary Millikenfirstname.lastname@example.org||State of Arizona Department of Homeland Security||CGI GTO delivers centralized, highly secure and fully managed solutions specifically designed to support state and local government needs.|
|CGI||CGI Advantage Cloud||In Process||SaaS||Moderate||1||A-Lign||Rosemary Millikenemail@example.com||State of Arizona Department of Homeland Security||CGI Advantage Cloud is a unified multi-tenant SaaS ERP solution that is designed, built, and optimized for the public sector. Our solution provides financial management, procurement, grants, human capital management, payroll, labor cost distribution, time and leave, budgeting, and advanced analytics capability that addresses the public sector’s most complex requirements out of the box. Advantage Cloud requires minimal workarounds or extensions associated with dual-use ERP systems that are built for private sector and then overlaid with public sector features.|
|DataBank Holdings||Colocation Managed Services||In Process||IaaS||Moderate||0||Secure IT||Mark Houptfirstname.lastname@example.org||CloudPlus delivers highly availability and secured cloud hosting, which includes monitoring, backups and recovery and 24x7x365 technical support.|
|Keeper Security Inc.||Keeper Security Government Cloud||In Process||SaaS||Moderate||0||A-Lign||Patrick Tiquetemail@example.com||Keeper Security Government Cloud (KSGC) transforms the way government organizations protect their operations against password-related data breaches and cyberthreats including ransomware and phishing attacks. KSGC provides IT administrators with visibility, management and control over their organization’s password security, monitoring and reporting. The KSGC cybersecurity platform utilizes a zero-trust framework and zero-knowledge security architecture and integrates with on-premise, cloud and hybrid-cloud environments. KSGC utilizes granular, role-based administrative controls including delegated administration. IT Administrators can enforce critical internal control policies including password complexity, IP white listing, two-factor authentication and Data Loss Prevention (DLP). KSGC’s modern provisioning tools allow organizations to rapidly deploy cybersecurity protection to thousands of users, on all their devices, and can integrate with any identity stack including AD, LDAP, SSO (SAML), SCIM and APIs. The cybersecurity platform includes robust event logging, reporting and auditing capabilities with seamless integration with Security Information and Event Management (SIEM) systems.|
|McAfee Enterprise||MVISION Cloud||In Process||SaaS||High||0||Kratos||Patrick McEnanyfirstname.lastname@example.org||McAfee MVISION Cloud discovers all cloud services in use across an organization’s network. It provides a corresponding readiness rating that allows system and data owners to assess cloud risk. It detects anomalous activity that may be indicative of a security breach or insider threat, enabling the organization to respond immediately to potential incidents. Additionally, McAfee MVISION Cloud enhances privacy controls by applying standards-based encryption or tokenization mechanisms to structured or unstructured data while maintaining searching, sorting, and formatting capabilities. McAfee MVISION Cloud enforces risk-based, inline, or offline compliance policies using notifications, blocking, or selective encryption to prevent the leakage of Personally Identifiable Information (PII) and offers the ability to synchronize policies with existing data loss prevention (DLP) solutions.|
|McAfee Enterprise||MVISION for Endpoint||In Process||SaaS||Moderate||0||Kratos||Patrick McEnanyemail@example.com||McAfee MVISION for Endpoint is a SaaS offering that is deployed on AWS GovCloud IaaS. The SaaS offering is made up of a suite of solutions developed by McAfee. McAfee MVISION for Endpoint enables customers to centrally manage security for their organization while leveraging real-time monitoring and protection of the environment. Machine learning, artificial intelligence, and behavioral analysis are used to detect and respond to suspicious activity based on comparing observed activity to real-world adversarial attack techniques.|
|Qualys||Qualys Cloud Platform||In Process||SaaS||Moderate||0||Coalfire Systems||Eric Kibisingofirstname.lastname@example.org||The Qualys Cloud Platform (QCP) is a multi-tenant shared cloud service environment. Its unique computing power is capable of continuously analyzing and correlating information, to assist IT management with identifying and homing-in on threats and eliminating vulnerabilities.|
|Rackspace Technology||Rackspace Government Cloud||In Process||Moderate||Schellman||Abel Sanchezemail@example.com||Rackspace Government Cloud (RGC) is purpose-built to help organizations achieve Assessment & Authorization faster and with cost savings of up to 70%. The platform is designed to support a government agency, systems integrator, or independent software vendor. Rackspace Government Cloud (RGC) wraps VMware and AWS in a secure-by-design management platform to meet the compliance requirements for FedRAMP and DoD Cloud Computing SRG. Customer solutions are deployed and managed in secured enclaves within US Rackspace datacenters and/or AWS East/West and GovCloud. Customers are provided with dedicated application stacks to maintain data security at the necessary levels. All this is backed by a 24x7x365 U.S. only support model that allows Rackspace to provide the highest levels of assurance and security to our government customers.|
|Relativity||RelativityOne Government||In Process||SaaS||Moderate||0||Coalfire Systems||Kristal Davyfirstname.lastname@example.org||RelativityOne Government brings the entire e-discovery process together in one secure and extensible platform, connected to your organizationâ€™s most sensitive dataâ€”and supported by the community of experts you need to untangle it all. Start and finish e-discovery in one solution with best-in-class security, scale, and performance and extend the functionality of the platform to meet your unique needs by leaning on apps built by our ecosystem of Relativity developer partners or building them yourself. With the latest in advanced searching and analytics, machine learning, and visualizations all built in, RelativityOne Government is your complete platform forâ€¯organizing data, discovering the truth, and acting on it.|
|Snowflake Inc.||Snowflake Data Cloud on AWS||In Process||SaaS||Moderate||0||Fortreum||Siddique Chaudhry||Siddique.email@example.com||Snowflake is the only data warehouse built for the cloud, enabling the data-driven enterprise with instant elasticity, secure data sharing and per-second pricing, across multiple clouds. Snowflake combines the power of data warehousing, the flexibility of big data platforms and the elasticity of the cloud at a fraction of the cost of traditional solutions. Find out more at https://www.snowflake.com/.|
|Snowflake Inc.||Snowflake Data Cloud on Azure Government||In Process||SaaS||Moderate||0||Fortreum||Siddique Chaudhry||Siddique.firstname.lastname@example.org||Snowflake is the only data warehouse built for the cloud, enabling the data-driven enterprise with instant elasticity, secure data sharing and per-second pricing, across multiple clouds. Snowflake combines the power of data warehousing, the flexibility of big data platforms and the elasticity of the cloud at a fraction of the cost of traditional solutions. Find out more at https://www.snowflake.com/.|
|Snowflake Inc.||Snowflake Data Cloud on AWS GovCloud||In Process||SaaS||Moderate||0||Fortreum||Siddique Chaudhry||Siddique.email@example.com||Snowflake is the only data warehouse built for the cloud, enabling the data-driven enterprise with instant elasticity, secure data sharing and per-second pricing, across multiple clouds. Snowflake combines the power of data warehousing, the flexibility of big data platforms and the elasticity of the cloud at a fraction of the cost of traditional solutions. Find out more at https://www.snowflake.com/.|
|Veracode||Veracode Application Security Scanning Platform||In Process||SaaS||Moderate||0||Schellman and Company, LLC||Claire Baileyfirstname.lastname@example.org||Veracode’s unified platform helps Government developers and application security teams assess and improve the security of applications from inception through production. With a combination of automation, process, and speed, Veracode integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the development/deployment chain. This solution is widely used by enterprises to secure web, mobile, legacy, and third-party enterprise applications, with a simpler and more scalable way to help reduce software security risk across software infrastructure.|
|WingSwept||Case Management & Tracking System (CMTS)||In Process||SaaS||Moderate||0||Lunarline||Allison Lehmanemail@example.com||WingSwept has provided case management solutions to investigators at government agencies for more than a decade. WingSwept converted its Case Management & Tracking System (CMTS) into a Commercial Off-The-Shelf (COTS) service offering in 2010. Built with both security and flexibility in mind, CMTS provides for the secure storage, retrieval, and reporting of case management data for investigative offices at all levels of government. The CMTS design is neither static nor monolithic. Intentionally flexible, CMTS provides government agencies with the ability to establish unique naming conventions, tailor agency-specific workflows, and to support a wide range of other user-preferred configurations. An idle-case tracking function also includes both time and activity-based notifications in order to establish and maintain a seamless agency workflow. As an added layer of security, each CMTS customer operates in a secure environment with data separated by customer. Hosted on Amazon Web Services (AWS), CMTS is a web-based, browser-accessible application that requires no device-specific software for implementation. Highly customizable dashboards, combined with specialized labels and entry fields provide investigators with the ability to compile and display comprehensive case metrics in a simplified, user-friendly format. CMTS can display ad-hoc and pre-defined reports in minutes, drastically reducing processing times and increasing staff efficiency. This flexible design allows agencies to tailor workflows in order to match existing processes and to provide for continuity in ongoing investigations. As a result, CMTS may be readily adapted to serve investigative offices of any size. Many of the CMTS customers leverage our optional Online Intake Service (OIS) which allows customers to host or leverage OIS hosted internet facing forms which can collect case intakes to be later securely picked up by the agency CMTS server for potential ingestion as a case.|
|Wolters Kluwer||TeamMate+||In Process||SaaS||Moderate||0||Schellman & Company, LLC||Jennifer Esterheld||TeamMate-FedRAMP@wolterskluwer.com||The TeamMate+ FedRAMP platform is a suite of services that provides tooling and functionality to auditors for management and tracking of the entire auditing process. The product suite includes TeamMate+ Audit, TeamMate+ Controls, and TeamMate+ Public Sector. The TeamMate+ FedRAMP suite allows auditors and audit organizations to define, track, and manage the audit process within their own standards. TeamMate+ FedRAMP leverages tooling and software to integrate with various services and resources across many systems, enabling auditors to achieve a holistic view of the organization. Through use of cloud technology and wide tooling integration, TeamMate+ FedRAMP enables organizations to align processes and goals for better strategic and tactical insights. TeamMate+ FedRAMP's environment utilizes higher standards for security and compliance, this system has very well-defined boundaries and controlled data ingress and egress patterns.|
|Zimperium||Zimperium zIPS||In Process||SaaS||Moderate||0||Coalfire Systems||Brian Caldwellfirstname.lastname@example.org||Zimperium zIPS is an advanced mobile threat defense solution for enterprises, providing persistent, on-device protection to corporate-owned and BYOD devices. Leveraging advanced machine learning, Zimperium zIPS detects both known and unknown threats across the kill chain: device, network, phishing, and app attacks. Once deployed on a mobile device, zIPS begins protecting the device against all primary attack vectors, even when the device is not connected to a network.|
|Zscaler||Zscaler Internet Access - Government (Secure Web Gateway - vTIC)||In Process||SaaS||High||1||Schellman and Company, LLC||Bradley Josephsemail@example.com||State of Arizona Department of Homeland Security||Zscaler Internet Access delivers your security stack as a service from the cloud, eliminating the cost and complexity of traditional secure web gateway approaches.|
|Cisco Systems, Inc.||Cisco Secure Workload (Tetration)||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco Secure Workload is a hybrid-cloud workload protection platform designed to secure compute instances in both the on-premises data center and the public cloud. These compute instances could be virtual machines, bare-metal servers, or containers. It uses machine learning, behavior analysis, and algorithmic approaches to offer this holistic workload protection strategy.|
|Cisco Systems, Inc.||Cisco Intersight||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Intersight is a cloud operations platform that consists of optional, modular capabilities of advanced infrastructure, workload optimization, and Kubernetes services. Cisco Intersight infrastructure services include the deployment, monitoring, management, and support of your physical and virtual infrastructure.|
|Cisco Systems, Inc.||Cisco SecureX||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco SecureX is the broadest, most integrated security platform that connects the breadth of Cisco's integrated security portfolio and the customer's infrastructure for a consistent experience. It unifies visibility, enables automation, and strengthens your security across network, endpoints, cloud, and applications--all without replacing your current security infrastructure or layering on new technology.|
|Cisco Systems, Inc.||Cisco Secure Endpoint||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Secure Endpoint (formerly AMP for Endpoints) offers cloud-delivered endpoint protection plus advanced endpoint detection and response across multi-domain control points.|
|Cisco Systems, Inc.||Cisco Cloud Email Security||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco SecureX is a cloud-native, built-in platform that connects Cisco Secure Email to the rest of the Cisco Secure Portfolio as well as 3rd party solutions. The broadest, most integrated platform on the market, SecureX removes bottlenecks that currently hinder convoluted security workflows.|
|Cisco Systems, Inc.||Cisco Webex||Active||SaaS||Moderate||0||Kratos||Debbie Bidwellemail@example.com||Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing.|
|Cisco Systems, Inc.||Cisco Cloudlock for Government||Active||SaaS||Moderate||0||Kratos||Claudio Bellolifirstname.lastname@example.org||Cisco Cloudlock is the cloud-native Cloud Access Security Broker (CASB) that helps accelerate use of the cloud. Cisco Cloudlock secures your cloud users, data, and apps, combating account compromises, data breaches, and cloud app ecosystem risks, while facilitating compliance through a simple, open, and automated API-driven approach.|
|Cisco Systems, Inc.||AppDynamics GovAPM||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||AppDynamics GovAPM is a software-as-a-service (SaaS) application performance monitoring (APM) solution. AppDynamics GovAPM provides end-to-end visibility into the performance of applications.|
|Cisco Systems, Inc.||Webex for Government||Active||SaaS||Moderate||0||Kratos||Debbie Bidwellfirstname.lastname@example.org||Cisco Webex for Government is a cloud collaboration service that allows customers to call, meet, and message on any device with a single unified application from Webex.|
|Cisco Systems, Inc.||Cisco Unified Communications Manager Cloud for Government||Active||SaaS||Moderate||0||Kratos||Debbie Bidwellemail@example.com||Cisco Hosted Collaboration Solution for Government (HCS-G) is a complete unified communications service from the Cisco cloud. It is built to provide government-level security so that organizations can collaborate with anyone, anywhere, on any device.|
|Cisco Systems, Inc.||Cisco Viptela SD-WAN||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco SD-WAN powered by Viptela/IOS XE is a highly secure, cloud-scale architecture that is open, programmable, and scalable. Through the Cisco vManage console, you can quickly establish an SD-WAN overlay fabric. Use it to connect data centers, branches, campuses, and colocation facilities to improve network speed, security, and efficiency.|
|Cisco Systems, Inc.||Webex Contact Center Enterprise for Government||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Webex® Contact Center Enterprise for Government provides a comprehensive, customizable, highly secure solution to meet the complex needs of the world’s largest contact centers. With readily extensible via open APIs and backed by the security and support benefits only available from a trusted brand like Cisco, Webex® Contact Center Enterprise for Government opens a path to the cloud for even the most business-critical contact centers.|
|Cisco Systems, Inc.||Cisco Managed Services Accelerator||Active||SaaS||Moderate||0||Kratos||Claudio Bellolifirstname.lastname@example.org||MSX FedRAMP is a multi-tenant SaaS orchestration platform created for Federal agencies, Federal service providers, and Federal service integrators to deliver managed services to market. MSX FedRAMP reduces the time to deploy a cloud service from 18 months to a few weeks by accelerating service creation, orchestration, and integration with external services via vendor APIs as well as supporting zero-touch provisioning.|
|Cisco Systems, Inc.||Cisco Umbrella Secure Internet Gateway||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Umbrella unifies multiple security functions in a single cloud service to secure internet access and control cloud app usage from your network, branch offices, and roaming users. Delivered from the cloud with 100% business uptime, Umbrella integrates secure web gateway, DNS-layer security, cloud-delivered firewall, cloud access security broker (CASB) functionality, and threat intelligence for the most effective protection against threats.|
|Cisco Systems, Inc.||Cisco Secure Cloud Analytics (Stealthwatch Cloud)||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco Secure Cloud Analytics is a cloud-delivered, SaaS-based solution that provides end-to-end visibility, behavioral analysis, and threat detection across your private network, public cloud, and hybrid environments. It uses dynamic entity modeling, based on network telemetry and cloud data sources, to rapidly identify threat activity and indicators of compromise to drastically improve your awareness and overall security posture.|
|Cisco Systems, Inc.||Cisco Nexus Dashboard||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Nexus Dashboard brings together unified proactive operations, actionable insights across data center networks, open to any fabric or domain, empowering seamless native and fabric agnostic solutions. It’s a powerful easy to use, easy to scale and easy to monitor data center to help operators open to any fabric and domain, leverage the power of NetOps/AIOps with easy to use consumption models across Cisco ACI and DCNM data center fabrics.|
|Cisco Systems, Inc.||Cisco Umbrella DNS||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco Umbrella provides DNS-layer security by enforcing security at the DNS and IP layers, Umbrella blocks requests to malicious and unwanted destinations before a connection is even established — stopping threats over any port or protocol before they reach your network or endpoints.|
|Cisco Systems, Inc.||Cisco Meraki||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Meraki’s cloud management provides centralized visibility & control over Meraki’s hardware, without the cost and complexity of on-premise based management servers and software, wireless controllers or overlay management systems. Integrated with Meraki’s entire product portfolio, cloud management provides feature rich, scalable, and intuitive centralized management for networks of any size.
Meraki’s access points, switches, SD-WAN/Security, video surveillance cameras, wireless WAN, mobile device management, IoT sensors, and WAN insight products are purpose built for cloud management. Cisco Meraki Cloud Networking Architecture allows you to turn your entire network deployment into one platform. With centralized visibility, you control campus or distributed sites and perform diagnostics remotely, eliminating the need for on-premise troubleshooting. You can also enhance network security measures centrally without having to manually install security patches and definition updates in all your branches.
|Cisco Systems, Inc.||Cisco CX Cloud||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Cisco CX Cloud is a cloud-based Software as a Service (SaaS). With CX Cloud, we help drive speed to value from your investment with Cisco and our technology. We do that by delivering the right information at the right time to help you achieve your desired outcomes faster. CX Cloud is a one-stop destination that combines Cisco expertise and best practices with telemetry, AI/ML-driven insights, use cases, and contextual learning.|
|Cisco Systems, Inc.||ThousandEyes||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.|
|Cisco Systems, Inc.||Cisco Smart Licensing||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Bellolifirstname.lastname@example.org||Smart Licensing is a cloud-based, software license management solution that enables you to automate time-consuming, manual licensing tasks. ... Smart Licensing offers you Cisco Smart Software Manager, a centralized portal that enables you to manage all your Cisco software licenses from one centralized website.|
|Cisco Systems, Inc.||Cisco Defense Orchestrator||Active||SaaS||Moderate||0||Coalfire Systems||Claudio Belloliemail@example.com||Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms.|
|Duo Security||Duo Federal||Active||SaaS||Moderate||0||Coalfire Systems||Minh Tranfirstname.lastname@example.org||Duo’s Federal Editions can verify the identity of users with secure and easy to use two-factor authentication methods that helps public sector entities satisfy NIST 800-63-3 and 53/63/171 authentication requirements. This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.|
|Equifax||Equifax EDGE||Active||PaaS||Moderate||0||Kratos||Shea Giesleremail@example.com||Equifax Government Data Exchange provides real-time income and employment verification service as well as HR management services to federal customers. These services are cloud-native and delivered using Equifax’s Data Fabric enterprise data management platform to provide maximum availability, scalability, and security.|
|FormAssembly, Inc.||FormAssembly Gov Cloud (FAGC)||Active||SaaS||Moderate||0||A-LIGN Compliance and Security, Inc. dba A-LIGN||Chad Craglefirstname.lastname@example.org||FAGC is a web application developed to help businesses build, design, and manage web forms and surveys. The application is aimed at professionals looking to automate form creation independently and can be used without the help of web developers. FAGC helps organizations in multiple industries quickly create web forms, collect data, and eliminate arduous workflows and manual data entry through smart integrations, all in a secure and compliant manner.|
|Geographic Solutions, Inc.||Virtual OneStop - GUS||Active||SaaS||Moderate||0||A-Lign||Paul Toomeyemail@example.com||Designed specifically for the diverse needs of the American Job Center system, VOS Sapphire is a Commercial Off-The-Shelf solution that offers over 50 functional modules and components that can be adapted to meet the exact requirements of any state or local workforce organization. We continuously enhance the system based on technological advances and user feedback to ensure it continues to be the most effective online workforce development solution available on the market today.|
|Mimecast Ltd.||Mimecast Federal Grid||Active||SaaS||Moderate||0||Schellman and Company, LLC||Harvey Sealefirstname.lastname@example.org||Mimecast Federal Grid is a set of cloud services designed to provide next generation protection against advanced email-borne threats such as but not limited to malicious URLs, malware, impersonation attacks, as well as internally generated threats.|
|SAP National Security Systems||Commercial Regulated Environment (CRE)||Active||SaaS, PaaS||Moderate||0||Forterum||Penny Kleinemail@example.com||SAP NS2 Commercial Regulated Environment (CRE) includes a suite of intelligent applications and experience management tools. Our intelligent suite includes applications for managing the operational transactions, HR and people management, analytics, and other innovative capabilities. The applications are integration-ready, include embedded intelligence, and offer a consistent and intuitive user interface.|
|Secure Code Warrior Inc.||Secure Code Warrior Learning Platform||Active||SaaS||Low||0||A-Lign||Dimithri Liyanagefirstname.lastname@example.org||Secure Code Warrior Training and Learning Platform - We guide each coder along their own preferred learning pathway, so that security-skilled developers become the everyday superheroes of our connected world. We succeed through a human approach that uncovers the secure developer inside of every coder - helping development teams ship quality code faster, so they can focus on creating amazing, safe software for our world.|
|Sophos||Sophos Intercept X||Active||SaaS||Moderate||0||A-Lign||John Stokesemail@example.com||Sophos Intercept X is the world’s best endpoint protection. It stops the latest cybersecurity threats with a combination of deep learning AI, anti-ransomware capabilities, exploit prevention and other techniques.|
|Tanium, Inc.||Tanium Cloud for US Government (TC-USG)||Active||SaaS||Moderate||1||Lunarline||Eric Kirscherfirstname.lastname@example.org||State of Arizona, Department of Homeland Security||"Tanium Cloud for US Government (TC-USG) delivers an agent-based endpoint management and security platform, managed and delivered as a cloud-hosted SaaS. The Tanium Core Platform and its services are automatically configured and maintained. For more information, please visit https://tanium.com The following TC-USG services are included within authorization boundary and are offered to customers individually or as desired: Tanium Interact, Tanium Asset, Tanium Comply, Tanium Connect, Tanium Deploy, Tanium Discover, Tanium Enforce, Tanium Impact, Tanium Integrity Monitor, Tanium Map, Tanium Patch, Tanium Performance, Tanium Provision, Tanium Reveal, Tanium Risk, Tanium Threat Response, Tanium Trends." From FedRAMP Marketplace.|
|Terida, LLC||The Terida RegTech Framework - CLASsoft™||Active||SaaS||Moderate||1||Kratos||Teri Princeemail@example.com||North Carolina Military Business Center||The Terida RegTech Framework - CLASsoft™ is a cloud-based e-operations (business, government, finance, insurance, legal, health, defence / defense) solutions to receive, manage, track, monitor, analyze, evaluate, resolve and audit registrations, applications, users, communications, claims, cases, files, forms and documents|
|WalkMe||Digital Adoption Platform||Active||SaaS||Moderate||0||Coalfire||Billy Biggsfirstname.lastname@example.org||Digital Adoption Platform - Gain visibility into the tech stack as you constantly identify gaps and problem areas to drive user experience of digital assets.|
Federal JAB Attestations
StateRAMP seeks to provide recognition to those products who have achieved a FedRAMP Authorization through Joint Authorization Board (JAB) approval. These products have undergone a rigorous audit and review from both a Third Party Assessment Organization (3PAO) and the FedRAMP JAB. StateRAMP wishes to highlight their efforts and provide an avenue for these products to be included in StateRAMP.
Products that have been awarded both a StateRAMP Authorized status and Federal JAB status are now listed on the APL as Authorized, Federal JAB.
Receive StateRAMP Updates
Interested in StateRAMP? Sign up below to receive StateRAMP Updates.