TrustMAPP September Release Notes

Published On: September 15, 2022

Better, Faster, Stronger (Analytics)

Cue the beat! Our analytics are better, faster, and stronger with raw speed. We’ve made it quicker to view a visual representation of your data and graphs and charts can now be downloaded as graphic files for presentations.


SOC2 Enhanced Recommendations

We made the SOC2 Recommendations even better with prescriptive guidance to further your journey with SOC2 compliance. Now, you can quickly demonstrate how your security controls can fulfill various SOC2 requirements. And it doesn’t stop there. This update satisfies all SOC2 requirements.


Better Export Capabilities

Calling all consultants! We’ve made exporting capabilities easier and better just for you. We’ve improved the capability to export to excel for integration for your own data manipulation.


CISV8 Assessment Template

We’ve added CISV8 but don’t worry, 7.1 isn’t going anywhere. We’ve combined the old and new. We updated CIS for modern compliance and enhanced recommendations to help you on your journey. We are also planning an upcoming podcast with CIS. Stay tuned to our podcast here:


We’ve Integrated with Cisco Secure Cloud Insights!

TrustMAPP is excited to announce its first data integration with the library of tools that exist in the cybersecurity space. This and future releases will allow TrustMAPP to consume your real-world cloud data that enhance your cybersecurity maturity posture in your assessments. Read more HERE.


That’s not all…


We Also Integrated With JupiterOne!

Read more HERE.

Browse These Topics


boost the protection of your data bridge the gap in your information security challenges build a cyber safe firm business decisions around security Challenges Facing Chief Information Security Officers CISO program efficacy CISO program management cyber security cyber security goals Cybersecurity management Cyber Security Mistakes cybersecurity performance management cyber security platform cyber security team Effective Data Security Measures effectively communicate with board members regarding cyber issues or threats elevate your security confidence elevating information security elevating your information security levels Identify Potential Security Weaknesses Implementing a Comprehensive Cyber Security Plan Implementing Strong Cyber Security Protocols Implementing strong security software protocols improve cyber security protocols Information Security Programs information security protection agency information security risk management information security solutions information security trends managing your information security effectively maturity of your information security and privacy programs measure security levels measure your security proprietary software can help you to protect your company Protect Against Costly Security Breach Protect Customer Data Protect Cyber Network risk management advisor risks of a data breach roadmap to better information security robust security monitoring service successful information security technology advancement top notch security software for your company traveling to high risk countries