SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISV
Case study of NetIQ ISV project
OVERVIEW
• NetIQ is an enterprise software company that provides products for identity and
access management, security and data center management
• Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard
application for risk and security compliance
• The clients for this application include Fortune 500 companies across numerous
industries as well as the United States government
CHALLENGES
• The solution was required to align security metrics gathered from users’
IT systems to demonstrate compliance with IT related policies and
regulations
• Those metrics had to be displayed in a powerful yet easy to understand,
web based dashboard for compliance management
• This solution also had to analyze IT risk factors such as compliance
exceptions and vulnerabilities across the key areas of the user’s business.
SOLUTION
• Atlas architects and engineers designed, developed and continue to
provide ongoing implementation services for the NetIQ Risk and
Compliance Center as well as the complete suite of NetIQ security
products
• Atlas Systems works closely with domain experts to perform
requirements gathering for Implementation Services, execute Product
Configuration/Product Enhancements, data integration and conversion
services
RESULTS
• Demonstrates regulatory compliance —The solution maps technical assessment results to
specific regulations and standards to present key compliance metrics for different control
areas. From high-level compliance reports, managers can drill down to problem areas and
render management reports based on regulation or security standard (e.g., Sarbanes-Oxley,
HIPAA, FISMA, ISO 17799).
• Delivers on-going risk analysis —The solution measures IT security risk in your environment
using innovative metric models that factor in the nature of compliance exceptions and
vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting,
along with executive overviews, makes it easy to spot potential problems before they impact
services or security.
• Centralizes security information for easier access and decision-making —The solution mines
security assessment results reflecting system configurations, vulnerabilities, patch levels, user
accounts and permissions, auditing and more into an enterprise dashboard.With easier access
to critical security information, managers can quickly assess security risks and regulatory
compliance in order to allocate resources effectively
• Turns complex data into actionable information —The solution presents information in easy-
to-understand charts, graphs and executive summaries via a customizable interface.Views can
be tailored to your regulatory, organizational and technical needs and drill down capabilities
make it easy to go from a high-level summary to a detailed analysis.

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paasAtlas Systems
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firmAtlas Systems
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax Academy
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content
 
Software architecture
Software architectureSoftware architecture
Software architectureRifad Mohamed
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSAbhishek Minocha
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubProduct Camp Dublin
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overviewpatmisasi
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationVikram Singla FCILT
 

Was ist angesagt? (20)

AMS Aconet
AMS AconetAMS Aconet
AMS Aconet
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
AMS Invision
AMS InvisionAMS Invision
AMS Invision
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firm
 
AMS Guardian 360
AMS Guardian 360AMS Guardian 360
AMS Guardian 360
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenter
 
IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
 
interface 9 what it is
interface 9 what it isinterface 9 what it is
interface 9 what it is
 
Remote dba
Remote dbaRemote dba
Remote dba
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
 
AMS Bid hunter
AMS Bid hunterAMS Bid hunter
AMS Bid hunter
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrix
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaS
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdub
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Ppt01
Ppt01Ppt01
Ppt01
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product Creation
 

Ähnlich wie ISV Net iq

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochureAnthony Franzini
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management SolutionsLexComply
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityBiZZdesign
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qsPhong Ho
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpseG Innovations
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 

Ähnlich wie ISV Net iq (20)

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochure
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
RESUME16
RESUME16RESUME16
RESUME16
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 

Mehr von Atlas Systems

Mehr von Atlas Systems (10)

SAP automobile major
SAP automobile majorSAP automobile major
SAP automobile major
 
DBA Thomson reuters db
DBA Thomson reuters dbDBA Thomson reuters db
DBA Thomson reuters db
 
BD JD power_1
BD JD power_1BD JD power_1
BD JD power_1
 
AMS Trilogy
AMS TrilogyAMS Trilogy
AMS Trilogy
 
AMS Spider
AMS SpiderAMS Spider
AMS Spider
 
AMS Skill derby
AMS Skill derbyAMS Skill derby
AMS Skill derby
 
AMS Miggly
AMS MigglyAMS Miggly
AMS Miggly
 
AMS Love sms
AMS Love smsAMS Love sms
AMS Love sms
 
AMS IT client
AMS IT clientAMS IT client
AMS IT client
 
Large health plan
Large health planLarge health plan
Large health plan
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

ISV Net iq

  • 1. ISV Case study of NetIQ ISV project
  • 2. OVERVIEW • NetIQ is an enterprise software company that provides products for identity and access management, security and data center management • Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard application for risk and security compliance • The clients for this application include Fortune 500 companies across numerous industries as well as the United States government
  • 3. CHALLENGES • The solution was required to align security metrics gathered from users’ IT systems to demonstrate compliance with IT related policies and regulations • Those metrics had to be displayed in a powerful yet easy to understand, web based dashboard for compliance management • This solution also had to analyze IT risk factors such as compliance exceptions and vulnerabilities across the key areas of the user’s business.
  • 4. SOLUTION • Atlas architects and engineers designed, developed and continue to provide ongoing implementation services for the NetIQ Risk and Compliance Center as well as the complete suite of NetIQ security products • Atlas Systems works closely with domain experts to perform requirements gathering for Implementation Services, execute Product Configuration/Product Enhancements, data integration and conversion services
  • 5. RESULTS • Demonstrates regulatory compliance —The solution maps technical assessment results to specific regulations and standards to present key compliance metrics for different control areas. From high-level compliance reports, managers can drill down to problem areas and render management reports based on regulation or security standard (e.g., Sarbanes-Oxley, HIPAA, FISMA, ISO 17799). • Delivers on-going risk analysis —The solution measures IT security risk in your environment using innovative metric models that factor in the nature of compliance exceptions and vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting, along with executive overviews, makes it easy to spot potential problems before they impact services or security. • Centralizes security information for easier access and decision-making —The solution mines security assessment results reflecting system configurations, vulnerabilities, patch levels, user accounts and permissions, auditing and more into an enterprise dashboard.With easier access to critical security information, managers can quickly assess security risks and regulatory compliance in order to allocate resources effectively • Turns complex data into actionable information —The solution presents information in easy- to-understand charts, graphs and executive summaries via a customizable interface.Views can be tailored to your regulatory, organizational and technical needs and drill down capabilities make it easy to go from a high-level summary to a detailed analysis.