Cyber Security

N-able Signs the CISA Secure by Design Pledge

The CISA pledge spotlights the commitment to continue building enhanced security into N-able products and services

N-able, Inc. (NYSE: NABL), a global software company helping IT services providers deliver remote monitoring and management, data protection as-a-service, and security solutions, today expanded its ongoing efforts to bolster the company’s cybersecurity posture, and in turn its partners and their customers, by signing the Cybersecurity and Infrastructure Security Agency (CISA) Secure By Design Pledge.

N-able was part of the first group of companies committed to the pledge and is currently the only vendor signed up with an ecosystem that is built from the ground up with MSPs in mind. The CISA pledge is taken by companies who are committed to making a good-faith effort to work towards increased security and transparency within the next year. By signing the pledge, N-able is further prioritizing security in its products and services, while building on its defenses against cyberthreats. The CISA pledge also points to the added safeguarding N-able is placing on its MSP partners’ data and the products and services they offer to their customers.

“Signing the Secure by Design pledge reaffirms our commitment to fundamentally integrating security into every stage of our development lifecycle. This approach is not simply about compliance; it’s about leadership in creating technology that can withstand emerging threats,” said Dave MacKinnon, Chief Security Officer at N-able. “We are dedicated to transparency, continuous improvement, and collaboration with industry partners and stakeholders. This pledge underscores our determination to build trust and constantly advance security in every piece of technology we deliver.”

The CISA Secure by Design Pledge is a voluntary initiative to promote integrating robust cybersecurity practices into product development and service offerings. The goals outlined in the pledge include:

  • Increasing the use of multi-factor authentication (MFA)
  • Decreasing the use of default passwords
  • Reducing the “prevalence of one or more vulnerability classes across the manufacturer’s products”
  • Increasing the installation of security patches by customers
  • Publishing vulnerability disclosure policies that authorize testing by customers and provide a “clear channel” to report vulnerabilities, as well as publicly disclose them “in line with coordinated vulnerability disclosure best practices and international standards”
  • Reporting accurate “Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE) fields in every Common Vulnerabilities and Exposures (CVE) record for the manufacturer’s products”
  • Increasing the “ability for customers to gather evidence of cybersecurity intrusions affecting the manufacturer’s products”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

Related posts

Salt Security releases new threat research from Salt Labs

PR Newswire

Druva Receives Cyber Catalyst Designation

Business Wire

ESET and Calgary Flames Sign Multi-Year Partnership

PR Newswire