Select Sidearea

Area for extra info, links, etc.
[email protected]
+(610) 816-010

CyberSecurity can only be achieved through the implementation of a CyberSecurity ERP


ClearArmor’s Cybersecurity ERP implements a fully NIST/ENISA compliant management framework, deploys processes, tools, technology & metrics that enable organization to achieve NIST/ENISA defined cybersecurity.


Result: A secure network, managed risk, & documented compliance.


You owe it to yourself to ask us how.


ClearArmor – the Operating System for CyberSecurity™

ClearArmor CSRP Introduction

It’s Not About Tools

Automated CyberSecurity Audits

Automated Risk Management

Map the Network

Designed & Engineered CyberSecurity for the Enterprise


It is impossible to meet NIST CSF and ISO cyber security standards without implementing a NIST compliant, designed and engineered cyber security process that is specific to the organization.


Achieving and proving compliance with the requisite standards can only be achieved through a fully documented and continuous audit process.


The CSRP defines requirements, specifies the process, deploys the technology, creates the database, performs the analysis, defines the required actions to achieve CyberSecurity, and then completes the audits of the structured implementation of the technology.


The CSRP delivers continuous NIST defined CyberSecurity – deployed, audited and verified.


Download Brochure >


A Managed Technology Approach to CyberSecurity


CyberSecurity is achieved by implementing a program, framework, and technology designed to fit the needs of the organization. A NIST CyberSecurity Framework-based design enables organizations to benefit from a wide range of industry best practices and meets regulatory requirements. Adopting a standards-based approach transforms your organization’s existing CyberSecurity program.


Read More >


Implement the Gold Standard


The 2017 Executive Order defines the NIST Cybersecurity Framework (NIST CSF) as the CyberSecurity standard for the Federal Government. Gartner predicts 50% of organizations will adopt the NIST CSF by 2020, making the NIST CSF the gold standard for CyberSecurity. Implementing the Framework will enable companies to meet CyberSecurity requirements demanded by industry, stakeholders, and the Government.


Read More >


ClearArmor CSRP

Out-Of-The-Box Cybersecurity™


ClearArmor’s CyberSecurity Resource Planning (CSRP) system is a combination of methodologies and technologies, which allow organizations to achieve conformance with the NIST CSF standard. Using CSRP, organizations implement and govern a structured, manageable, and sustainable CyberSecurity program which aligns the organization’s business imperatives with its security initiatives. This innovative approach to CyberSecurity earned ClearArmor an invitation to NIST’s National Cybersecurity Center of Excellence.


Read More >

Find Out More
CSRP Data Sheet

Your CyberSecurity Transformed

ClearArmor CSRP

Automated implementation of the NIST Cybersecurity Framework

Track and access organization security training and awareness

Maintain a continuously updating database of the entire network including hardware, software, and IoT devices

Total real-time visibility into the network, attack surface, and the current CyberSecurity state

Implementation of an integrated CyberSecurity process that includes discovery, antivirus, malware, intrusion detection, and SIEM

Automation and orchestration of the software distribution, patching, monitoring, SIEM, and intrusion detection

Continuously monitor, identify risks, and conduct vulnerability assessments - SCAP, STIX, TAXII

All tools and cyber processes working within a unified environment

An automated reporting and dashboarding capability

Meet GDPR requirements

Meet 23 NYCRR 500 requirements

A Blend of Process and Technology Guided by the Framework

Find Out More

Reports, Dashboards, Governance

Find Out More

ClearArmor CyberSecurity Platform and Technology


Defined SOPs, continuous monitoring, automation, risk identification/mitigation, stack consolidation, compliance, reporting, and advanced technology in one product – all based on industry standards.

Real-Time Discovery of Network Components

Software and Hardware Management


Patch Management and Validation

Software Whitelisting / Blacklisting

Hardware Whitelisting / Blacklisting

Secure Software Deployment

Vulnerability and Configuration Testing Using Military-Grade Processes

Application Mapping

Port Flow Analysis

Real-Time Hash Management

Automated Configuration Management

Active Directory Management

Third-Party Integrations

Cloud, Virtual Machine, IoT, and Mobile Device CyberSecurity Management

Establish a Security-Focused Culture

Employee security participation and a security-focused corporate culture is an often-overlooked but core component of Cyber Governance.


End-Point security is an integral part of the ClearArmor CSRP. The most important network endpoint is the employee.


A proper CyberSecurity process includes a documented and continuous employee CyberSecurity program. The ClearArmor CSRP platform can integrate with existing Employee Security programs for documentation.

The process tracks employee CyberSecurity training, providing management summaries of activities and performance.

Find Out More

Arm yourself with the tools, technology, and processes needed to create and maintain a secure IT landscape.

Manage your Risks & Vulnerabilities

Latest News & Info

CyberSecurity - It's Not About Tools from ClearArmor Corporation

CyberSecurity – It’s Not About Tools

CyberSecurity isn't about tools, it's about reducing risk to your organization. Collaborative integration of key functions will dramatically improve your CyberSecurity posture. The orchestrated result is measurable risk reduction, vulnerability

Software Vulnerabilities Risk Remediation

Risk Reduction Through Software Vulnerability Identification and Reduction

Software Vulnerabilities Risk Remediation from Bruce Hafner

Pragmatic CyberSecurity and Risk Reduction ClearArmor

Pragmatic CyberSecurity and Risk Reduction

 Pragmatic CyberSecurity and Risk Reduction from Bruce Hafner

Equifax CEO to Testify before Congress

Equifax CEO Called to Testify Before Congress; Company Under FTC Probe

  The House Energy and Commerce Committee sent a letter to Equifax CEO Richard Smith formally requesting testimony before Congress. The cybersecurity breach, which was first discovered on July 29, targeted

cyberattack legal protections

Effective Legal and Regulatory Defense for CyberSecurity Incidents

  How would your organization defend itself in a court of law or to regulators in the event of a CyberSecurity incident?   This is a question that many organizations

Effective Metrics for CyberSecurity

Effective Metrics for CyberSecurity Enterprise Risk Management

  CEOs and Boards have identified CyberSecurity threats as a significant enterprise risk, governed with the same rigor and discipline as other corporate risk.   Effective governance depends upon robust

CyberSecurity Best Practices

Bad CyberSecurity Policy is Bad Business

  It is estimated that Cybercrime will cause losses in excess $6 trillion by 2025.   Many of these losses can be avoided through the implementation of effective CyberSecurity policies.

Spring Holiday Scams

  With the Easter and Passover holidays approaching, it is important to be wary of holiday-related scams.   Some of the most commonly seen scams include: Electronic “greeting card” software

Dr. Mark Matties Joins ClearArmor’s Advisory Board

Joining ClearArmor’s Board of Advisors is CyberSecurity expert, Dr. Mark Matties. Dr. Matties has over 20 years of experience designing, developing, and deploying computer networks and network security solutions. He is the

Tax Season Scams CyberSecurity

Phishing Caution During Tax Time

  With tax season upon us, it is wise to be on guard for phishing and other attacks that can make it easy for others to assume your identity. Phishing,

Updated CyberSecurity Best Practices for Energy, Industrial, & Healthcare Networks

CIS and NIST recently updated their critical security controls and framework. The critical security controls and framework make us CyberSecuirty and Network Mangement Best Practices.   Cybersecurity breaches into energy, industrial,

[Webinar] A Team-Based Approach to CyberSecurity

  A Team-Based Approach to CyberSecurity: C-Level Executives, General Counsel, and Decision Makers – Security Challenges   CyberSecurity breaches mean big losses for companies, including headlines that drive away customers,


ClearArmor Corporation Named One of the 20 Most Promising Cyber Security Solution Providers 2016 by CIOReview

FREMONT, CA—2016— ClearArmor Corporation announced today that it has been placed in the list of 20 Most Promising Cyber Security Solution Providers 2016 by CIOReview.   “It’s a great honor to