Comprehensive software reviews to make better IT decisions
RSA Updates RSA Archer and NetWitness Platforms
In a move to better respond to digital risk resulting from digital transformation and innovation priorities, RSA has updated the RSA Archer and NetWitness Platforms.
Archer is RSA’s governance, risk, and compliance (GRC) platform and includes cyber incident and breach response capabilities. NetWitness is RSA’s threat detection security incident and event management (SIEM) system. To gain a current picture of organizational risk, integration of real-time information about vulnerabilities and controls is required.
In a recent announcement, RSA indicated that it was “investing in both product areas to deliver a unified approach to advanced security operations and integrated risk management ... to better manage digital risk.”
Assessment of business risk in today’s complex architecture of custom and off-the-shelf applications deployed on premises, in a hybrid environment, or in the cloud is more difficult than ever. Layer on top of that the increasing demand to comply with new and evolving security and privacy compliance requirements, the business finds itself challenged to make decisions based on complete information.
Governance, risk, and compliance tools need to evolve to support management’s needs. Their original roots in the compliance space has evolved over time, however, to continue to thrive in the market, they must better reflect current state risk posture and provide additional value. GRC tools must continue to evolve through smart, data-driven integration and become a knowledgebase as well as audit compliance platform.
Want to Know More?
Source: Governance, Risk and Compliance at SoftwareReviews, Accessed April 5, 2020
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.
In an interview with Allison Furneaux, VP Marketing at CyberSaint Inc., developers of CyberStrong Integrated Risk Management platform in June 2020, Allison indicated that its focus has been on cybersecurity from the beginning.
LogicGate is a governance, risk and compliance automation platform offered by LogicGate Inc., headquartered in Chicago, that helps organizations to automate their risk processes.
I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at Onspring to discuss the product audience and upcoming features.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.