| NIST CUI
NIST CUI Compliance for Communications and Data
Easily protect Controlled Unclassified Information (CUI) for all your data. Meet CUI compliance requirements for email, chat, support, forms, file sharing, and data transfer to protect sensitive data.
The most effective way to protect CUI throughout its lifecycle
XQ helps protect data in flight and at rest, secure communications, and maintain NIST compliance by enabling the simplest to implement and scale private data-sharing workflows in the industry.
Integrating seamlessly with Gmail, Microsoft Outlook, email, chat, support, support, forms, file sharing, data transfer, and custom workflows, XQ fits within your current workflows so you can increase your ROI on existing infrastructure within minutes to protect CUI and ensure NIST compliance.
Easy end-to-end email, file, and database
XQ Data Gateway for cloud-managed data transfer from on-prem to hybrid cloud
Self-service API and application management
Free SDKs are publicly available to protect data in any app.
Sustained protection travels with CUI, securing it at every link in the supply chain.
Adherence to NIST 800-171 guidelines.
Prepare for upcoming Cybersecurity Maturity Model Certification (CMMC) requirements in 2025.
Full Protection and Control Wherever CUI Travels
-
Sustained Protection
XQ provides end-to-end encryption and access controls that protect CUI and other sensitive data, wherever and however it is shared.
-
Data Residency
XQ uniquely geolocates each data access request. This also means XQ can geofence data. XQ is the only solution providing geofencing at the data level for HIPAA compliance. With XQ, data stays where it is supposed to.
-
Chain of Custody Audit
Each interaction with your data, whether it is IoT, CCTV, email, or chat, is logged with who, where, and when the access was attempted. XQ provides a complete auditable trail.
-
Maintain Control and Access Visibility
Enable secure communication and data transfer between primes, subcontractors, and mission partners by implementing CUI practices for Access Control, Audit, and Accountability. Revoke access immediately, set expiration, and reprovision on a per data object basis to maintain control of CUI.
Audit who has accessed CUI, when, and where. Integrate event logs with your SIEM such as qRadar, Splunk, or SolarWinds for advanced threat intelligence or export for analysis.
-
Automatic CUI Protections with Data Loss Prevention (DLP)
Automatically enforce encryption and access controls that persist throughout supply chain workflows, by configuring DLP rules that detect CUI data before it is sent.
-
Data Control
Your data is most at risk after it leaves your possession. With XQ, you retain the ability to know what happens to your data, revoke access to it or reprovision it with granular access controls for Data Lifecycle Management.
-
On-Prem to Hybrid Cloud Data Transfer
XQ Secure Gateway is the most secure, scalable, and simple to maintain offering for a completely auditable trail of your micro-segmented data wherever it travels. For the first time, connect GCP, AWS, and Azure seamlessly and compliantly for new powerful workflows.
For the first time, GCP, AWS, and Azure can be connected seamlessly while maintaining compliance and allowing you to unlock new and powerful workflows.
-
Policy Access Controls
Geo-restrict, revoke or expire or reprovision access to data. Add dynamic custom policy constraints. Implement DLP rules to automatically apply controls to any workflow containing CUI.
-
Meet NIST 800-171 Security Guidelines
With an added layer of data-centric encryption, you can improve your security posture while aligning with NIST 800-171 security recommendations for protecting CUI. Use the NIST Cybersecurity Framework to reduce your organization’s security risks and meet compliance standards.
NIST 800 53 is a wide ranging set of security recommendations spanning everything from configuration of systems to program management.
Within NIST 800 53 there are also specific controls that deal with data where XQ can provide value.
Access Control
Access Control requires that protected data is only readable by authenticated and authorized users or software systems. XQ’s policy-based key distribution ensures that only authenticated and authorized users and software programs are able to access encryption keys. XQ supports a number of techniques from security tokens, cookies, IP whitelisting and IP geo-fencing to control access to data.
Audit and Accountability
Audit and Accountability requires that there is a log of all transactions to ensure compliance. XQ’s policy-based key distribution logs every event including all failed key requests (i.e. it’s impossible to do anything without generating a log entry in the XQ system). All of the XQ logs are indexed to enable search/sort functionality.