SNAP-DEFENSE
RISK AND
COMPLIANCE REPORTING
robust RISK AND COMPLIANCE REPORTING FRAMEWORK

In an attempt to combat the proliferation and damage of cyberattacks, many industries, professional organizations, and governments have established security, data protection, and data privacy compliance standards. While many of these compliance standards promote best practices and lessons learned from past misfortune, being “compliant” does not ensure an organization is safe from attack, data loss, or reputation damage.
At Blackpoint, we focus our solutions first and foremost on security. However, we recognize the value in applying best practices and that many organizations have mandatory compliance requirements. Thus, we include compliance mapping and reporting for popular compliance standards for free in our SNAP-Defense platform. We believe an organization can be compliant and significantly more secure without spending a fortune.

Supported Compliance Standards
NIST 800-171
HIPPA
PCI-DSS
NYCRR-500
ISO/IEC-27001
Got a compliance standard we don’t currently support?
Reach out and let us know!
KEY BENEFITS
SNAP-Defense supports compliance adherence as well as audits and assessments. Its dedicated Compliance report allows organizations to identify which compliance controls SNAP-Defense satisfies as well as obtain required information to satisfy audits or assessments.

Historical Reports

Compliance Checklists

& Money
Identify Security Risks and
Ensure Continuous Compliance
Summary Report
- Outstanding alerts by criticality, type, and time
- Overall system health and status
- Suppressed events by type and time
Privileged Activity Report
- New/most/least active privileged users
- New/all remote executions
- Remote executions by user and application
- New/all RDP activity
- RDP activity by user, source, and destination
- New/all privileged share activity
SECURITY EVENTS REPORT
- Anti-malware events by severity, type, and time
- Process and service threats by severity, type, and device
- New attack sources and targeted devices
- New point-to-point connections
- New/all USB activity
- USB activity by device
- New/all malware persistence techniques
Network REPORT
- Detected enumeration activity
- Enumeration activity by source, destination, and time
- Core network change detection
- SNMP community strings
- Insecure core network passwords
- Network Management devices, including TACACS, SNMP, NETFLOW, SYSLOG, NTP, and RADIUS