Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Organizational Threat Model
Developing a data management plan, or data governance is essential for any organization to protect sensitive information and comply with regulations.
Learn more
Marian Reed
Data Encryption
Many organizations are operating in a grey area, both ethically and legally, in terms of how they are managing consumer data. What data is being collected and stored? Data privacy is more than compliance – businesses should consider marketing benefits associated with handling data in a confidential manner.
Alex Williams
Google Cloud Platform
In previous posts, we have covered security around Azure and AWS cloud solutions and now it’s time to look at the third big contestant, Google Cloud Platform.
Esteban Mendoza
Identity and Access Management
In our three-part series Cloud Armor works as a multi-layer firewall for your GCP resources. To configure it, you must use Security Policies which are basically rules that allow or deny traffic from an IP or an IP range.
Cloud Infrastructure
Stackdriver provides a centralized method of receiving signals, logs, metrics, and traces from your GCP resources, so you can quickly see when there is any alert on your cloud.
Back to Resources
We are an international squad of professionals working as one.
Email
Phone