Select Sidearea

Area for extra info, links, etc.
[email protected]
+(610) 816-010

The Operating System for CyberSecurity

CyberSecurity Resource Planning (CSRP)

The critical elements required by all Cyber Programs. Map your goals. Understand the Landscape. Identify your Problems. Prioritize your remediations. Track your Progress. CSRP is the Operating System for CyberSecurity.


Integrated Risk Management

Reducing Silos between Audit, Compliance, Risk, IT, and Cyber Teams

Rapid implementation of a mature and continuous program. Regulatory Alignment. Controls Adoption. Policies Defined. Audits Implemented. Risks Identified, reduced, planned for, and tested. Responsibility and Accountability assigned. Silos destroyed.


Network Mapping - Vulnerability Reduction

Identifying the Vulnerabilities from Within

The granular elements that make up your network are discovered, identified, whitelisted, categorized, mapped, scanned, and tagged for vulnerability and configuration issues. All tied back to what matters most, critical Business Imperatives.


Momentum Methodology

Mapping the Organization to Reduce the Risk

Rapid uptake of the Momentum Methodology (M2) allows your organization to tailor your Cyber Program to your organization. Understand the relationship between Business Imperatives, Business Functions, and all the way down Systems and Endpoints.


Cyber Culture Built In

Change the Culture and Change the Game

The Program is in place. The Risk is being Reduced. The Vulnerabilities are being eliminated. You’re not finished until you change the culture. Now adopt the most powerful Cyber Awareness training and testing program on the planet.

ClearArmor – the Operating System for CyberSecurity™


M2 – Momentum Methodology

M2 is the bridge between Technology, Leadership, and Process. M2 provides a standardized method to understand, implement, and work toward continued improvement in CyberSecurity

CMO – Cyber Management Office

CMO – The Cyber Management Office provides the ability to governance and manage the individual efforts your organization must execute to achieve continued improvement in CyberSecurity

CM – Controls Management

CM – Controls Management aligns your organization to the frameworks and regulatory controls they have voluntarily, or are required to follow.

PM – Policy Management

PM – Policy Management provides the ability to document and communicate how policy relates to organizational controls.

AM – Audit Management

AM – Audit Management sets the ownership, governance, schedules, and processes for auditing that the policies and controls in effect.

RM – Risk Management

RM – Risk Management allows the organization to understand and manage the events, triggers, impacts, potential reductions, reduction progress, response plans, and documented testing of those plans.

ITAM – IT Asset Management

ITAM – IT Asset Management allows for the discovery, heterogeneous data source integration, data normalization, white listing, categorization, ownership, lifecycle management, and vendor management related to hardware and software assets.

VAC – Vulnerability and Compliance

VAC – Vulnerability and Compliances provides the mechanisms to identify Software, hardware, and configuration based vulnerabilities through integrations and interfacing to IT Asset Management, IT-Pedia®data, Open Source Vulnerability Scanning, and SCAP Scanning.

CC – Cyber Culture

CC-Cyber Culture leverages included InfoSec Institute CyberAwareness Training to eliminate risk at a key CyberSecurity breach vector, people. CC starts with the rapid, engaging, and short training sessions. CC follows with testing progress using documented scores and Phishing simulation testing across the organization.

DM – Data Mapping

DM – Data Mapping allows the organization to associate key granular data with other data, making collected information more powerful and meaningful to pre-built and custom dashboards and representations.

Latest News & Info

CyberSecurity - It's Not About Tools from ClearArmor Corporation

CyberSecurity – It’s Not About Tools

CyberSecurity isn't about tools, it's about reducing risk to your organization. Collaborative integration of key functions will dramatically improve your CyberSecurity posture. The orchestrated result is measurable risk reduction, vulnerability

Software Vulnerabilities Risk Remediation

Risk Reduction Through Software Vulnerability Identification and Reduction

Software Vulnerabilities Risk Remediation from Bruce Hafner

Pragmatic CyberSecurity and Risk Reduction ClearArmor

Pragmatic CyberSecurity and Risk Reduction

 Pragmatic CyberSecurity and Risk Reduction from Bruce Hafner

Equifax CEO to Testify before Congress

Equifax CEO Called to Testify Before Congress; Company Under FTC Probe

  The House Energy and Commerce Committee sent a letter to Equifax CEO Richard Smith formally requesting testimony before Congress. The cybersecurity breach, which was first discovered on July 29, targeted

cyberattack legal protections

Effective Legal and Regulatory Defense for CyberSecurity Incidents

  How would your organization defend itself in a court of law or to regulators in the event of a CyberSecurity incident?   This is a question that many organizations

Effective Metrics for CyberSecurity

Effective Metrics for CyberSecurity Enterprise Risk Management

  CEOs and Boards have identified CyberSecurity threats as a significant enterprise risk, governed with the same rigor and discipline as other corporate risk.   Effective governance depends upon robust

CyberSecurity Best Practices

Bad CyberSecurity Policy is Bad Business

  It is estimated that Cybercrime will cause losses in excess $6 trillion by 2025.   Many of these losses can be avoided through the implementation of effective CyberSecurity policies.

Spring Holiday Scams

  With the Easter and Passover holidays approaching, it is important to be wary of holiday-related scams.   Some of the most commonly seen scams include: Electronic “greeting card” software

Dr. Mark Matties Joins ClearArmor’s Advisory Board

Joining ClearArmor’s Board of Advisors is CyberSecurity expert, Dr. Mark Matties. Dr. Matties has over 20 years of experience designing, developing, and deploying computer networks and network security solutions. He is the

Tax Season Scams CyberSecurity

Phishing Caution During Tax Time

  With tax season upon us, it is wise to be on guard for phishing and other attacks that can make it easy for others to assume your identity. Phishing,

Updated CyberSecurity Best Practices for Energy, Industrial, & Healthcare Networks

CIS and NIST recently updated their critical security controls and framework. The critical security controls and framework make us CyberSecuirty and Network Mangement Best Practices.   Cybersecurity breaches into energy, industrial,

[Webinar] A Team-Based Approach to CyberSecurity

  A Team-Based Approach to CyberSecurity: C-Level Executives, General Counsel, and Decision Makers – Security Challenges   CyberSecurity breaches mean big losses for companies, including headlines that drive away customers,


ClearArmor Corporation Named One of the 20 Most Promising Cyber Security Solution Providers 2016 by CIOReview

FREMONT, CA—2016— ClearArmor Corporation announced today that it has been placed in the list of 20 Most Promising Cyber Security Solution Providers 2016 by CIOReview.   “It’s a great honor to