RSA Archer eGRC is a highly customizable Governance, Risk and Compliance platform that enables companies to automate business processes, monitor progress through dynamic reporting and control access across multiple GRC centric solutions. Overarching modules or use cases usually consist of Compliance, Audit, Risk, Vendor, Incident, Business Continuity, and Security Management among others. Use cases will vary from company to company depending on the maturity of existing GRC processes.
Keylight consists of a fully integrated suite of management applications designed to manage all facets of compliance and risk programs, including IT Risk Management, Operational Risk Management, Vendor Risk Management, Audit Management, Business Continuity Management and Corporate Compliance.
LockPath® designed the Keylight platform to be flexible, scalable and easily configurable to quickly adapt to changing needs without relying on ongoing technical assistance. It allows you to seamlessly import, centralize, and manage large amounts of data without a single line of code.
Identity and Access Management (SSO & MFA)
RSA Identity Governance & Lifecycle provides secure access to cloud and mobile applications without creating roadblocks for users. RSA Secure ID Access delivers a streamlined request, approval, and fulfillment process with embedded policy controls. Governance automates the monitoring, certification, reporting and remediation of entitlements to ensure appropriate access. RSA Secure ID Access ensures continuous compliance with changing rules and regulations without rendering current IAM investments obsolete.
SailPoint gives you the power to: see everything, govern everything, empower your users, and reduce IT risk. SailPoint Identity enables you to see all the information, apps, users, data, and access, so you can make the right security decisions. It helps to answer the question “who has access to what” for your entire security ecosystem, ensuring that employees, partners and contractors have the right access at the right time, from any device. It reduces IT risk by placing prevention and detection controls to ensure access is within corporate policy at all times.
Advanced Security Operations
RSA NetWitness is a set of products and services which can be deployed standalone or together. RSA Security Analytics enables you to detect, investigate, and respond to threats before they cause damages. RSA ECAT defends your endpoints from advanced threats by going beyond signature-based tools to block and limit their impact. RSA Security Operations Management prioritizes security investigations, centralizes alert collection, and automates incident management workflows to better orchestrate and manage your security operations.
Comodo 360 solves the problem of providing complete Specialized Threat Analysis and Protection to every aspect of your organizations information footprint. From your controlled internal networks to the boundary and to all of your deployed endpoints, Comodo 360 has your organization covered.
Phantom is a security automation and orchestration platform that integrates with your existing security technologies in order to provide a layer of “connective tissue” between them.
Phantom streamlines security operations through the execution of digital “Playbooks” to achieve in seconds what may normally take minutes or hours to accomplish with the dozens of point products that you use every day.
Phantom doesn’t replace existing security products, but instead makes your investment in them smarter, faster and stronger.
Phantom accomplishes this through a logical architecture that abstracts product capabilities, through the Phantom App model, into simple Actions that can be automated from within Playbooks. This allows Phantom to act as an “operating system” for your security products.
Request more information
Threat And Vulnerability Management
RiskSense ingests vulnerability data from your endpoints, networks and applications then correlates with multiple sources of external threat intelligence, leveraging the industry’s leading scanners and security tools. Using advanced risk scoring to assign different levels of risk to assets, applications, and business processes, RiskSense allows you to prioritize your vulnerabilities.
Tenable Network Security transforms security technology with comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable provides comprehensive vulnerability management while prioritizing security risks and providing a clear view of your security posture. With Tenable you can visualize, measure and analyze the effectiveness of your security program.
Rapid7 can pinpoint, prioritize, and fix exposures to reduce your overall risk with our leading vulnerability management, penetration testing, and application security solutions. From the endpoint to the cloud, quickly find intruders, trace their tracks, and stop the breach before the damage is done. Help speed investigations so you can halt threats and clean up systems fast.
Prioritize Your Vulnerabilities
Kenna uses almost any vulnerability scanner you may have (Qualys, Nessus, Rapid7) and integrates it with over 8 threat feeds, giving you unparalleled insight into what you need to fix first. It’s like having a team of data scientists working on your behalf.
Request more information
Since 1992, Unified Compliance has developed ground-breaking tools to support IT best practices with a special focus on regulatory compliance, metrics, systems continuity, and governance. Developed in 2005, the Common Controls Hub, the SaaS portal built on to the Unified Compliance Framework®, is Unified Compliance’s flagship product. The UCF’s content and methodology is the direct result of our deep understanding of IT regulations and standards as well as decades of experience consulting for clients, publications, and vendors in the mission-critical IT arena.
Continuous Security Validation
AttackIQ purpose-built the FireDrill SaaS platform to easily integrate into any existing network to almost immediately identify security gaps and provide actionable insight to improve your security posture. Continually challenge your network with AttackIQ’s curated inventory of attack and validation scenarios. Justify current and future IT spending using direct measurements of your infrastructure. Build in-house security expertise by encapsulating your best practices in the platform. “Try AttackIQ’s FireDrill for 2 Weeks FREE.”