Cyber Risk Scorecards & Posture Assessments
Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.
Vulnerability Management & Analytics
Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.
File Integrity Monitoring
File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
Regulation & Compliance Management
Regulatory compliance is an effort to ensure a company is aware of the steps needed to comply with relevant laws, policies, and regulations. Security reflects a large portion of these compliances.
Identity Governance and Administration (IGA)
IGA systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.
IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.
Elements of IGA Systems
– Password management
– Integrations
– Access request management
– Automated Provisioning
– Entitlement management
Mobility Management and/or Security (MxM)
Manage and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
Features typically include:
– Device Tracking
– Application Control
– Remote-wipe
– Anti-Malware
– Web Filtering
– Inventory Management
– Anti-theft
Network Vulnerability Assessment and/or Penetration Test
A network vulnerability assessment is a process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
Dark Web Monitoring
Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.