Oops! Something went wrong while submitting the form.
Upcoming
On-demand
Security
Blog
Your ultimate guide to security frameworks
Explore key security frameworks to strengthen your organization's cybersecurity.
No items found.
Upcoming
On-demand
Security
Blog
Using Vanta and AWS for secrets management and encryption
Learn how to manage secrets and cryptography within AWS and how Vanta can make demonstrating compliance here easier.
No items found.
Upcoming
On-demand
Product updates
Blog
Automate more of your compliance program with custom tests
With Custom Tests, you now have the ability to adjust Vanta’s pre-built tests as well as create new tests from scratch with new logic. Read more.
Features
Integrations
Upcoming
On-demand
Product updates
Blog
New in Vanta | February 2024
Vanta recently rolled out new capabilities, including NIST AI RMF, custom automated tests, system integrations, and updates to Trust Center.
AI
Features
Integrations
Upcoming
On-demand
Security
Blog
What is a trust center? And how to use it to demonstrate trust
Learn what a trust center is and how your organization can benefit from it.
No items found.
Upcoming
On-demand
Product updates
Blog
Introducing NIST AI RMF: Monitor and mitigate AI risk
The NIST AI RMF is now available in beta, giving you a governance framework within Vanta to mitigate the risks associated using AI technologies.
AI
Risk Management
Upcoming
On-demand
Product updates
Blog
Introducing AI Data Import for Access Reviews
With AI Data Import for Access Reviews, you can now seamlessly upload user access information from screenshots and PDFs into Vanta.
Features
Upcoming
On-demand
Company news
Blog
Celebrating new milestones plus enterprise-ready features and more AI capabilities
We’re thrilled to announce several growth, product, and partner milestones. And we're just getting started.
AI
Features
Upcoming
On-demand
Security
Blog
How to automate your technical vulnerability management with Aikido and Vanta
See how the integration between Aikido and Vanta can help you easily identify, manage, and automate your technical vulnerabilities to achieve and maintain compliance.