Attention A T users. To access the menus on this page please perform the following steps. 1. Please switch auto forms mode to off. 2. Hit enter to expand a main menu option (Health, Benefits, etc). 3. To enter and activate the submenu links, hit the down arrow. You will now be able to tab or arrow up or down through the submenu options to access/activate the submenu links.

VA Technical Reference Model v 25.1

 Search <abbr>VA TRM</abbr>
 Search VA TRM

Search by Term

Search by VA Category 
View VA Categorization Framework
View the Interactive Graphic

To conduct a search based on the VA Categorization framework you must select a Domain, an Area, and a Category.

Search by Filter

Select any of the following filters to limit the search results to entries matching the selected criteria. Filter searches can be combined with term and category searches.


Your search results for: - Published Entry (filter)                                                                                                                                                      
Export To: generate excel file generate word file

Name
Vendor
Status
Decision Date
Waratek Enterprise is a Technology Waratek Analysis Completed 11/28/2022 at 02:39:47 UTC
Carbon Black Application Control is a Technology VMware Analysis Completed 11/02/2023 at 18:47:55 UTC
Application Control (Solidifier) is a Technology TrelliX Skyhigh Security Analysis Completed 10/14/2024 at 01:20:07 UTC
SD Elements is a Technology Security Compass Analysis Completed 11/29/2023 at 14:39:02 UTC
Hypertext Transfer Protocol Blackbox (HTTPBlackbox) .NET Edition is a Technology SecureBlackbox Analysis Completed 04/30/2020 at 14:27:51 UTC
Java Hypertext Markup Language (HTML) Sanitizer is a Technology OWASP Analysis Completed 02/02/2023 at 18:46:51 UTC
JavaScript Object Notation (JSON) Sanitizer is a Technology OWASP Analysis Completed 06/07/2024 at 18:33:10 UTC
NTRU TCG Software Stack (TSS) is a Technology OnBoard Security, Inc. Analysis Completed 05/14/2020 at 14:24:06 UTC
Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a Technology Microsoft Analysis Completed 12/12/2023 at 12:58:56 UTC
Host Access Management and Security Server is a Technology Micro Focus Analysis Completed 02/06/2024 at 02:01:21 UTC
JetBrains dotPeek is a Technology JetBrains Analysis Completed 12/04/2024 at 19:12:01 UTC
International Organization for Standardization (ISO) 27001 Information technology - Security techniques - Information security management systems - Requirements is a Standard or Specification ISO Analysis Completed 10/07/2024 at 22:23:16 UTC
IObit Advanced SystemCare is a Technology IObit Analysis Completed 04/17/2023 at 16:02:55 UTC
Idera Structured Query Language (SQL) Secure is a Technology Idera Analysis Completed 12/09/2022 at 20:10:30 UTC
Hex-Rays Decompiler is a Technology Hex-Rays SA Analysis Completed 11/16/2018 at 10:03:10 UTC
Hex-Rays Interactive Disassembler (IDA) is a Technology Hex-Rays SA Analysis Completed 05/23/2024 at 16:18:52 UTC
Security Content Automation Protocol (SCAP) is a Standard or Specification HealthData Analysis Completed 10/14/2024 at 01:23:01 UTC
Eagle6 is a Technology Eagle6 Analysis Completed 08/10/2023 at 00:54:49 UTC
DCode is a Technology Digital Detective Analysis Completed 08/05/2020 at 16:37:02 UTC
CyberArk Privileged Session Manager (PSM) Client is a Technology CYBERARK Analysis Completed 08/19/2024 at 14:47:30 UTC
Crestron Fusion is a Technology Crestron Analysis Completed 03/20/2024 at 02:44:56 UTC
Crestron Toolbox is a Technology Crestron Analysis Completed 10/25/2024 at 15:59:06 UTC
Clang Static Analyzer is a Technology Chris Lattner Analysis Completed 08/02/2022 at 18:18:33 UTC
Symantec Mail Security for Microsoft Exchange is a Technology Broadcom Analysis Completed 08/26/2022 at 00:53:17 UTC
Password Management Toolkit is a Technology Bamboo Solutions Analysis Completed 02/10/2020 at 08:39:00 UTC
AVI-SPL Symphony is a Technology AVI-SPL Analysis Completed 12/20/2023 at 19:06:11 UTC
Aqua Security Enterprise Self-Hosted (on-prem) is a Technology Aqua Security Analysis Completed 05/08/2024 at 13:47:59 UTC
Total = 27
is a Technology Indicates a technology
is a Standard Indicates a standard or specification
is a List of Standards or Technologies Indicates a list of standards or technologies
entry is associated with a locked category Indicates the entry is associated with a locked category