SlideShare a Scribd company logo
1 of 3
Download to read offline
eVenture Review
electronic	Venture	ensuring	national	
technology,	understanding	&	responsible	
engineering
Knowing	your	service	providers	digital	risks	can	
be	just	as	important	as	knowing	your	own
Networks
Data	Centers
Cloud
Risk
Security	
Practices
SaaS
Data
Cloud	providers	touch	your	network	and
If	they	are	at	risk,	you	are	too
Your	companies	network
3rd party	cloud	service	providers
How we can help your business
The architecture and engineering of an organization is listed in the SSAE 16. However,
one has to have the ability to tear it apart with a complete awareness and
comprehensive understanding of computer architectures, infrastructures, virtualization,
encryption, transmission, clouds, engineering, and physical and logical, security, just to
note as to whether or not the SSAE 16 is of value or not. This is exactly what eVenture
Review, LLC does in its exclusive RAPIER Report.
The review process of eVenture Review is unlike any of which organizations provide today
in our industry for no one has rationalized that the SSAE 16 is not only about the findings
as everyone would have you believe, but it is more about the design and engineering of
the hosting cloud providers for that is the blue-print as to how one is handling NPI
information. To understand this, it requires extensive computer engineering methodology
understanding and awareness as well as extensive knowledge of cloud computing
environments.
The RAPIER Report

RAPIER - Review Accurately Providing Information Ensuring Responsibility
eVenture Review, LLC has developed the RAPIER Report, which is a process applying
engineering methodologies and security practicum's in the review process of the SSAE
(Statement on Standards for Attestation) No. 16 reports being provided by AICPA
(American Institute Certified Public Accountants) accredited institutions, on behalf of
public cloud providers.
The purpose is to ensure public cloud providers are complying with the technical
controls defined in the SSAE 16 so industries relocating their NPI (Non-Public
Information) data to the public cloud providers is safe-guarded.
The report eVenture Review, LLC, called the RAPIER Report, consists of the following
characteristics as its framework - 20 categories consisting of approximately
300 elements, being compared to 8 critical elements to ensure public cloud providers
are in fact properly safeguarding NPI (Non-Public Information) as a standard and
practice.
We've performed engineering reviews on approximately 233 SSAE 16s the past six
years from 34 AICPA firms consisting of 133 public cloud providers across the United
States. This also includes the largest cloud providers in the United States.

More Related Content

What's hot

SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto Splunk
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessSplunk
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem CompTIA
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk
 
Serious Games for Cyber Security - The Human Factor
Serious Games for Cyber Security - The Human FactorSerious Games for Cyber Security - The Human Factor
Serious Games for Cyber Security - The Human FactorPatrick Bartl
 
Protect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureProtect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureQ1 Labs
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130Francisco Maroto
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- InfographicTestingXperts
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegifyflashnewsrelease
 
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg Splunk
 
Gartner Symposium 2018: BMW Group Presentation
Gartner Symposium 2018: BMW Group PresentationGartner Symposium 2018: BMW Group Presentation
Gartner Symposium 2018: BMW Group PresentationSplunk
 
Fintech summit 2016 society one & clearmatch
Fintech summit 2016   society one & clearmatchFintech summit 2016   society one & clearmatch
Fintech summit 2016 society one & clearmatchGlen Frost
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseSplunk
 
SplunkLive! Stockholm 2018 - Customer presentation: Telia
SplunkLive! Stockholm 2018 - Customer presentation: Telia SplunkLive! Stockholm 2018 - Customer presentation: Telia
SplunkLive! Stockholm 2018 - Customer presentation: Telia Splunk
 
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...SAS Institute India Pvt. Ltd
 

What's hot (20)

SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
Utilities Themes 2016
Utilities Themes 2016Utilities Themes 2016
Utilities Themes 2016
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
 
Serious Games for Cyber Security - The Human Factor
Serious Games for Cyber Security - The Human FactorSerious Games for Cyber Security - The Human Factor
Serious Games for Cyber Security - The Human Factor
 
Protect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureProtect & Defend Your Critical Infrastructure
Protect & Defend Your Critical Infrastructure
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
 
Gartner Symposium 2018: BMW Group Presentation
Gartner Symposium 2018: BMW Group PresentationGartner Symposium 2018: BMW Group Presentation
Gartner Symposium 2018: BMW Group Presentation
 
Fintech summit 2016 society one & clearmatch
Fintech summit 2016   society one & clearmatchFintech summit 2016   society one & clearmatch
Fintech summit 2016 society one & clearmatch
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Infographic dsci 2016
Infographic dsci 2016Infographic dsci 2016
Infographic dsci 2016
 
Emerging Technologies are Raising the Bar for Insurers
Emerging Technologies are Raising the Bar for InsurersEmerging Technologies are Raising the Bar for Insurers
Emerging Technologies are Raising the Bar for Insurers
 
SplunkLive! Stockholm 2018 - Customer presentation: Telia
SplunkLive! Stockholm 2018 - Customer presentation: Telia SplunkLive! Stockholm 2018 - Customer presentation: Telia
SplunkLive! Stockholm 2018 - Customer presentation: Telia
 
Data driven-business
Data driven-businessData driven-business
Data driven-business
 
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
 

Viewers also liked

Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitaeliilk
 
Employment in Canada -
Employment in Canada - Employment in Canada -
Employment in Canada - Canada Jobmail
 
In memoriam Marian Cozma
In memoriam Marian CozmaIn memoriam Marian Cozma
In memoriam Marian CozmaMihaela
 
Introduction to the law of robots and AIs - lecture 5
Introduction to the law of robots and AIs - lecture 5Introduction to the law of robots and AIs - lecture 5
Introduction to the law of robots and AIs - lecture 5Nicolas Petit
 
Mari Joseppt
Mari JosepptMari Joseppt
Mari Josepptelmus
 
Progettazione e realizzazione di un apparato di electrospinning per la realiz...
Progettazione e realizzazione di un apparato di electrospinning per la realiz...Progettazione e realizzazione di un apparato di electrospinning per la realiz...
Progettazione e realizzazione di un apparato di electrospinning per la realiz...Mario Cifelli
 
Incidencias y mantenimiento_en_hplc
Incidencias y mantenimiento_en_hplcIncidencias y mantenimiento_en_hplc
Incidencias y mantenimiento_en_hplcLiliana Celaya
 
Prezentatsia_menedzhment
Prezentatsia_menedzhmentPrezentatsia_menedzhment
Prezentatsia_menedzhmentSery Fomin
 
Фінансовий облік. Тема: Інвестиції
Фінансовий облік. Тема: ІнвестиціїФінансовий облік. Тема: Інвестиції
Фінансовий облік. Тема: ІнвестиціїВіталій Дячук
 
Gamification in HR - Manu Melwin Joy
Gamification in HR - Manu Melwin JoyGamification in HR - Manu Melwin Joy
Gamification in HR - Manu Melwin Joymanumelwin
 
Information Technology and Its Applications - nursing - social networks - 3
Information Technology and Its Applications - nursing - social networks - 3Information Technology and Its Applications - nursing - social networks - 3
Information Technology and Its Applications - nursing - social networks - 3Sascha Funk
 
Ia project Apprentissage Automatique
Ia project Apprentissage AutomatiqueIa project Apprentissage Automatique
Ia project Apprentissage AutomatiqueNizar Bechir
 

Viewers also liked (17)

Mainstreaming brs
Mainstreaming brsMainstreaming brs
Mainstreaming brs
 
Diary3
Diary3Diary3
Diary3
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Employment in Canada -
Employment in Canada - Employment in Canada -
Employment in Canada -
 
In memoriam Marian Cozma
In memoriam Marian CozmaIn memoriam Marian Cozma
In memoriam Marian Cozma
 
Introduction to the law of robots and AIs - lecture 5
Introduction to the law of robots and AIs - lecture 5Introduction to the law of robots and AIs - lecture 5
Introduction to the law of robots and AIs - lecture 5
 
Day 5 7
Day 5   7Day 5   7
Day 5 7
 
Mari Joseppt
Mari JosepptMari Joseppt
Mari Joseppt
 
La musica
La musicaLa musica
La musica
 
Progettazione e realizzazione di un apparato di electrospinning per la realiz...
Progettazione e realizzazione di un apparato di electrospinning per la realiz...Progettazione e realizzazione di un apparato di electrospinning per la realiz...
Progettazione e realizzazione di un apparato di electrospinning per la realiz...
 
Incidencias y mantenimiento_en_hplc
Incidencias y mantenimiento_en_hplcIncidencias y mantenimiento_en_hplc
Incidencias y mantenimiento_en_hplc
 
Prezentatsia_menedzhment
Prezentatsia_menedzhmentPrezentatsia_menedzhment
Prezentatsia_menedzhment
 
壓力管理
壓力管理壓力管理
壓力管理
 
Фінансовий облік. Тема: Інвестиції
Фінансовий облік. Тема: ІнвестиціїФінансовий облік. Тема: Інвестиції
Фінансовий облік. Тема: Інвестиції
 
Gamification in HR - Manu Melwin Joy
Gamification in HR - Manu Melwin JoyGamification in HR - Manu Melwin Joy
Gamification in HR - Manu Melwin Joy
 
Information Technology and Its Applications - nursing - social networks - 3
Information Technology and Its Applications - nursing - social networks - 3Information Technology and Its Applications - nursing - social networks - 3
Information Technology and Its Applications - nursing - social networks - 3
 
Ia project Apprentissage Automatique
Ia project Apprentissage AutomatiqueIa project Apprentissage Automatique
Ia project Apprentissage Automatique
 

Similar to eVenture Marketing Slick1.1

Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesRightNow Technologies
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightRackspace
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHappiest Minds Technologies
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceSonatype
 
App sec owasp from developers prospective
App sec owasp from developers prospectiveApp sec owasp from developers prospective
App sec owasp from developers prospectiveSecurity Innovation
 
Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report Diego Alberto Tamayo
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)Silverio A. Sierra
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENGSWASCAN
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Introduction to Event-Driven Architecture
Introduction to Event-Driven Architecture Introduction to Event-Driven Architecture
Introduction to Event-Driven Architecture Solace
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 

Similar to eVenture Marketing Slick1.1 (20)

Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government Agencies
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the Light
 
J3602068071
J3602068071J3602068071
J3602068071
 
Dreamforce 2015
Dreamforce 2015Dreamforce 2015
Dreamforce 2015
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
App sec owasp from developers prospective
App sec owasp from developers prospectiveApp sec owasp from developers prospective
App sec owasp from developers prospective
 
Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENG
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Introduction to Event-Driven Architecture
Introduction to Event-Driven Architecture Introduction to Event-Driven Architecture
Introduction to Event-Driven Architecture
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 

eVenture Marketing Slick1.1

  • 3. How we can help your business The architecture and engineering of an organization is listed in the SSAE 16. However, one has to have the ability to tear it apart with a complete awareness and comprehensive understanding of computer architectures, infrastructures, virtualization, encryption, transmission, clouds, engineering, and physical and logical, security, just to note as to whether or not the SSAE 16 is of value or not. This is exactly what eVenture Review, LLC does in its exclusive RAPIER Report. The review process of eVenture Review is unlike any of which organizations provide today in our industry for no one has rationalized that the SSAE 16 is not only about the findings as everyone would have you believe, but it is more about the design and engineering of the hosting cloud providers for that is the blue-print as to how one is handling NPI information. To understand this, it requires extensive computer engineering methodology understanding and awareness as well as extensive knowledge of cloud computing environments. The RAPIER Report
 RAPIER - Review Accurately Providing Information Ensuring Responsibility eVenture Review, LLC has developed the RAPIER Report, which is a process applying engineering methodologies and security practicum's in the review process of the SSAE (Statement on Standards for Attestation) No. 16 reports being provided by AICPA (American Institute Certified Public Accountants) accredited institutions, on behalf of public cloud providers. The purpose is to ensure public cloud providers are complying with the technical controls defined in the SSAE 16 so industries relocating their NPI (Non-Public Information) data to the public cloud providers is safe-guarded. The report eVenture Review, LLC, called the RAPIER Report, consists of the following characteristics as its framework - 20 categories consisting of approximately 300 elements, being compared to 8 critical elements to ensure public cloud providers are in fact properly safeguarding NPI (Non-Public Information) as a standard and practice. We've performed engineering reviews on approximately 233 SSAE 16s the past six years from 34 AICPA firms consisting of 133 public cloud providers across the United States. This also includes the largest cloud providers in the United States.