Now Available On Demand

Real Verifiable Security

FIPS 140-2 and DISA STIG: what they mean, and why you need them

Register Now

With bad actors attacking companies from multiple directions, it's important to take measures to prevent not just loss of data, but more insidious threats. But how do you know your system is secure when applications depend on so many moving parts?

One way is to conform to the same standards required by the United States federal government for their systems -- or at least, to base your systems on components that do. Fortunately, these standards are publicly available, so both users and vendors can build products to these requirements.

In this webinar, You will learn:

  • What Federal Information Processing Standards (FIPS) 140-2 is and how it works
  • How FIPS 140-2 prevents data loss
  • How to tell if a vendor's product really conform to FIPS 140-2
  • How to build on a FIPS 140-2 certified product to achieve your own certification
  • Where the Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) is required and how to achieve it


Bryan Langston

Director of Cloud Architecture, Mirantis

Register Now

By submitting form you are agree to our Privacy Policy