Secure Elements, Inc., a leader in standards based compliance and vulnerability management solutions; today announced at the National Security Automation Conference that they will offer a zero-cost Public Service License to approved organizations public sector and non-profit public service entities.
"As the first vendor to offer an open solution that fully leverages the XML standards for compliance and vulnerability management, we felt compelled to remove the typical barrier to adoption high initial license fees and enable broad adoption by those entities that serve and protect our national interests and critical infrastructures," said Ned Miller, CEO of Secure Elements. "Offering our solution with a zero- cost license allows Federal, State, and Local public sectors and non-profit organizations to achieve their vulnerability management and regulatory compliance goals in the most cost effective manner available on the market today."
The C5 EVM solution is built upon several key XML Standards Open Vulnerability Assessment Language (OVAL 5.0), and the eXtensible Configuration Checklist Description Format (XCCDF) as promoted by the Department of Homeland Security (DHS), the National Security Agency (NSA), the National Institute of Standards and Technology (NIST), the Defense Information Systems Agency (DISA), and others. In response to the Cyber Security Research and Development Act of 2002, NIST developed the Security Configuration Checklists Program for IT Products, for which they are now publishing checklists in the XCCDF format.
"Secure Elements' offer of a zero-cost license will result in more secure eGovernment and public service environments," said Marcus Sachs, former White House IT security expert and now a deputy director in the Computer Science Laboratory at SRI International, where he supports the Washington D.C. operations of the U.S. Department of Homeland Security's Cyber Security Research and Development Center. "With the increased emphasis on safeguarding personally identifiable information across all organizations, this will afford those organizations with budget constraints the benefits of auditing and securing their networks.