Ready, recoverable, resilient networks
CMMC Compliance
Proactive CMMC compliance assessments and risk-prioritized remediation with Certified-Assessor-ready reports
Supply Chain Security: Evidence-based CMMC (Cybersecurity Maturity Model Certification) Compliance
All DoD prime contractors and sub-contractors handling FCI and CUI must identify, assess and mitigate supply chain-related security threats in their networks through obtaining CMMC 2.0 certification. Aligning to federal government security efforts demonstrates that they can protect their government customers, as well as themselves, from threat-actors.
Nipper solutions are trusted by US military and civilian federal agencies and their prime and sub-contractors to accurately automate network device assessments against trusted security benchmarks and risk management frameworks, including CMMC 2.0, levels 1 and 2.

Validate compliance with evidence
Accurately automate the assessment of CMMC network security practices relating to network devices, providing pass/fail evidence of compliance in assessor-ready reports.

Improve compliance posture
Prioritize risk by network criticality and receive device-specific guidance on how to fix misconfigurations, informing POAMs and decreasing remediation time.

Assess for configuration drift
Gain awareness of any device configuration changes, providing assurance that planned network changes have not created new vulnerabilities as well as alerting to unplanned changes.

Research Report
This study reveals that an average of 51 network device misconfigurations were discovered in a two-year period with 4% deemed to be critical vulnerabilities that could take down the network within the U.S. Federal Government.

Evidence based compliance with CMMC
Establish a baseline to use when creating a roadmap to compliance. Nipper solutions accurately check whether a configuration passes or fails to comply with CMMC practices, providing specific information on the test(s) performed to reach this conclusion.
Assess Compliance
Detect non-compliances and effectively manage configuration drift with CMMC assessments of routers, switches and firewalls.


Automate Assessor-ready Reporting
Simplify compliance reporting processes for CMMC network infrastructure requirements with Certified-Assessor-ready reports within minutes.
Prioritize Remediation of Exploitable Risks
Determine which software vulnerabilities and misconfigurations to fix first using automated prioritization of findings with mitigating advice to inform remediation workflows. Quickly and accurately check devices are configured according to vendor hardening guides and comply with organizational/ regulatory security policies.


Deliver Security from CMMC Compliance
Automate an accurate, timely, and scalable approach to CMMC compliance, ensuring proactive security as key to protecting agency and supply chain networks from preventable attacks.
Automate network-wide CMMC Assessments
Close your most critical network security and CMMC compliance gaps with Nipper solutions’ risk-prioritized remediation.
Explore Related Resources

The financial impact of exploitable misconfigurations on network security
Find out why there is a disconnect between network security perception and the costly reality, and just how much firewalls are prioritized over switches and routers.

Cybersecurity Maturity Model Certification Mapping Document
Information on the Cybersecurity Maturity Model Certification (CMMC) network security practices that can be audited using Nipper.

Nipper Product Overview - Risk-based Vulnerability Management
Delivering security from compliance - Automating accurate, on-demand router, switch and firewall configuration security assessments with Nipper.

Looking for automated configuration assessment to:
-
Evidence compliance with CMMC and NIST SP 800-171?
-
Minimize your attack surface?
-
Reduce the mean time to remediate vulnerabilities?