SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Secure-GRC – On premise solution
Compliance logging and secure storage
Logging and storing audit logs is mandated by most regulations for review. While many logging vendors exist         Page | 1
today they are expensive, appliance based and do not provide a comprehensive work flow that integrates
compliance framework. SecureGRC changes the way logging requirement is simplified and unified from cost,
scalability, and integrated compliance framework perspective.
        Firewalls and VPNs
        IDS/IPS
        Vulnerability Scanners
        Unix hosts
        Windows hosts
        Mainframe hosts
        IT applications
        ERP systems
        Databases
        Cloud Service products
        IT infrastructure products
        Proprietary systems

Integrated Case Management
SecureGRC is equipped with compliance case management framework which gives end to end visibility to
security and compliance cases for the organizations which another example of true integration of Security
and IT-GRC management.
Audit Management

What is Audit Management?
Audit management is the overall process of managing the overall audit process. It enables organizations to
reduce dependence on paper, perform the functions faster and with fewer resources and provides a
trackable audit trail for these functions.

Audit Manager
SecureGRC Audit Management feature provides an integrated solution to managing the functions, documents
and tasks associated with audits (IT, Security or Financial) of any organization. In addition, it provides access
to the core elements from the SecureGRC platform such as Workflow, Document Management, Audit Work
paper repository, Fine-grained access control through a secure Web based interface

Key Features
        Single and Centralized repository for all work papers


                                                                 TM
                                              SecureGRC
   Version control for all work papers
       Link work papers to controls
       Schedule audits
       Assign personnel to audits
       Audit trail                                                                                             Page | 2
       Ability to track audit failures
       Dashboards and reports


Request for more ready to use kits

Vendor Compliance Management
SecureGRC Vendor Management solution enables you to manage an effective vendor management process:
risk-based vendor selection, centralized document management, and remediation management. What is
Vendor Management?
Vendor Management is the process financial institutions worldwide use to understand the risks they assume
due to their business relationships with their third-party vendors especially regarding their data sharing or
outsourcing relationships. Vendor Management is a standard practice today and has matured to an extent
where some leading financial industry groups such as BITS have standardized the process significantly
through their Standard Information Gathering (SIG) and Agreed upon Procedures (AUP) standards. The usage
of these standards or their derivatives helps organizations understand the risk associated with their vendors
and then incorporate appropriate risk mitigation techniques and measures to mitigate the risk.

Key Features
       Automate monitoring of controls such as management of sensitive data and technical controls.
       Enable vendor managers to manage risk.
       Assess vendor risk using various assessment types and a library of questions based on best-practice
        standards.
       Derive risk and compliance ratings by type of vendor from assessment results.
       Measure vendor compliance to policies and procedures.
       Track and address areas of non-compliance identified in the vendor assessment process.



Merchant Compliance Management
SecureGRC's merchant compliance management helps banks and financial institutes to ensure their
merchants comply with the regulations applicable to their business. What is Merchant Management?

According to VISA
Acquirers are responsible for ensuring that all of their merchants comply with the PCI Data Security Standard
(DSS) requirements

And according to MasterCard


                                                               TM
                                              SecureGRC
MasterCard fundamentally views our member Acquirers as owning the acquiring payment channel. Given this
perspective, MasterCard works to administer the SDP Program through our Acquirers, working with
merchants to further secure the transaction infrastructure. Please note that acquirers themselves do not need
to go through the SDP compliance process but they must manage the SDP process for their merchants.
Merchant Management is the process that enables card acquirers to ensure that their merchants are
compliant with the PCI Data Security Standard and thereby satisfy the demands of the various card brands.
                                                                                                                Page | 3
SecureGRC’s merchant management enables organizations (banks, acquirers, service providers etc. ) to
manage the compliance of their merchants with the PCI DSS. Merchant management automates many of the
manual tasks associated with the merchant compliance process. When organizations are dealing with
thousands of merchants, the process of managing compliance could consume an enormous amount of
resources, time and money. CMM enables organizations to reduce all of these by providing a single interface
to all compliance processes through a universally accessible web based interface.

Key Features
       Automate monitoring of controls such as management of sensitive data and technical controls.
       Enable vendor managers to manage risk.
       Assess vendor risk using various assessment types and a library of questions based on best-practice
        standards.
       Derive risk and compliance ratings by type of vendor from assessment results.
       Measure vendor compliance to policies and procedures.
       Track and address areas of non-compliance identified in the vendor assessment process

Policy Management
What is Policy Management?
Policy management is the overall process of managing the plethora of policies, procedures, guidelines and
other documents that are part of the governance framework and function in any organization.

SecureGRC Policy Manager
SecureGRC Policy Manager provides an integrated solution to managing all the policies, procedures,
guidelines, or standards that are the basis of the governance framework at any organization. Policy Manager
allows organizations to consolidate all their policies, store them in a central repository, measure the
compliance with these policies, and view various statistics from a central dashboard.
Policy Manager provides access to the core elements from the SecureGRC platform such as Workflow,
Document Management, Policy Inventory, Fine-grained access control through a secure Web based interface.

Key Features
       Single and centralized repository for all policies
       Version control for all policies and procedures
       Monitor acceptance of policies
       Out of the box policy and procedure templates
       Ability to link policy and procedures to controls
       Dashboards and reports

                                                              TM
                                              SecureGRC
   Remediation tracking

Asset and Vulnerability Management
What is Asset and Vulnerability Management?
Asset management involves discovering, identifying and classifying assets such as servers, desktops, laptops
etc that are part of any organization. Due to the fact that most digital information that forms the basis for any Page | 4
Governance Risk Management and Compliance (GRC) process of any organization resides on assets, it is
imperative that organizations manage their assets. Vulnerability Management consists of the ability to
discover the vulnerabilities associated with assets and provide the data and insight necessary to manage the
vulnerabilities through the use of direct fixes or application of compensating controls.
SecureGRC Asset and Vulnerability Manager provides an integrated solution to managing the functions, data
and tasks associated with assets and related vulnerabilities. Asset and Vulnerability Manager uses the core
elements from the CC-GRC platform such as Workflow, Document Management, Controls and Asset
repository, Fine-grained access control through a secure Web based interface.

Key Features
       Accurate asset discovery
       Single and Centralized repository for all assets and vulnerabilities
       Ability to link Assets to controls
       Schedule audits
       Scan for vulnerabilities remotely
       Map assets and vulnerabilities to regulations
       Remediation tracking
       Dashboards and reports

Compliance Scanning
What is Compliance Scanning?
SecureGRC's compliance scanning is a unique feature that allows scanning of data concerned with PCI
compliance in various data stores. Compliance Scanner allows QSAs/Auditors and consultants to streamline
and automate the process of evaluating PCI compliance during onsite engagements. Results from leading
vulnerability scanners and application scanners, along with cardholder data search features are processed by
the Compliance Scanner to pre-populate approximately half the controls of PCI DSS.
Features of Compliance Scanner for QSAs include:
       Easy interview wizard to walk QSAs through the entire process.
       Automated search for cardholder data within servers and databases.
       Automated mapping of application/network vulnerabilities (from leading security scanners) to
        “cardholder” assets and servers.
       Automated firewall rule set analysis and mapping of faulty rule sets to PCI requirements.
       Generation of Report on Compliance with more than half controls pre-populated with accurate data
        on cardholder systems, their vulnerabilities and misconfigured firewall rule sets.


                                                                TM
                                             SecureGRC
Key Features
        SecureGRC Compliance Scanner helps QSAs save a significant amount of time and resources to
         perform PCI assessments.
        It also improves consistency of assessments across people and time and can help demonstrate the
         quality needed by the PCI Council.
                                                                                                                 Page | 5
Data Discovery
What is Data Discovery?
Finding credit card data is one of the key and initial steps needed for compliance with the Payment Card
Industry (PCI) Data Security Standard (DSS). The standard clearly prohibits storage of card holder data in an
unencrypted manner.
SecureGRC Data Discovery addresses this key need and was one of the first comprehensive scanners that not
only searches for credit card data on file systems, but also in most commercial and open source databases.
Data Discovery rapidly helps define the scope of a PCI assessment or certification and helps concentrate the
efforts of the assessment. It usually is an eye-opener for many organizations that are surprised by the
unintended proliferation of credit card data within organizations once CDD scans their environment. Those
discoveries help organizations control the storage of the data or implement means to encrypt the data.

Key Features
        Find unencrypted credit card data in ANY type of file - Word Documents, Excel Spreadsheets, PDFs,
         Access databases. CDD is not constrained by file types, rather it allows you to search the whole hard
         disk for credit card data
        Find credit card data in network shares
        Find credit card data across the WHOLE network from one location. CDD needs Microsoft Active
         Directory (AD) or Domain level credentials and using those credentials, you can search for card data
         on desktops, laptops, servers etc all from one location.
        Convenience of searching from one place, no need to go to each desktop/laptop to search for data
        Find credit card data in most popular commercial and open source databases such as Oracle, SQL
         Server, and MySQL etc.
        Extremely fast and uses very few resources - network or CPU resources


For details visit: www.eGestalt.com




                                                               TM
                                             SecureGRC

Weitere ähnliche Inhalte

Andere mochten auch

Charles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationCharles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationJess Farr
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 
Yashar zargari
Yashar zargariYashar zargari
Yashar zargarisimorgh
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness DecoderAegify Inc.
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHAegify Inc.
 
Ncvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationNcvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationJess Farr
 

Andere mochten auch (9)

Charles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationCharles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership Presentation
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
Yashar zargari
Yashar zargariYashar zargari
Yashar zargari
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Ncvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationNcvo october 7 yrhf presentation
Ncvo october 7 yrhf presentation
 
Issue based organizing
Issue based organizingIssue based organizing
Issue based organizing
 

Mehr von Aegify Inc.

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityAegify Inc.
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedAegify Inc.
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security SolutionsAegify Inc.
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryAegify Inc.
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaasAegify Inc.
 

Mehr von Aegify Inc. (11)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support Cybersecurity
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus Demystified
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Secure-GRC – On premise solution

  • 1. Secure-GRC – On premise solution Compliance logging and secure storage Logging and storing audit logs is mandated by most regulations for review. While many logging vendors exist Page | 1 today they are expensive, appliance based and do not provide a comprehensive work flow that integrates compliance framework. SecureGRC changes the way logging requirement is simplified and unified from cost, scalability, and integrated compliance framework perspective.  Firewalls and VPNs  IDS/IPS  Vulnerability Scanners  Unix hosts  Windows hosts  Mainframe hosts  IT applications  ERP systems  Databases  Cloud Service products  IT infrastructure products  Proprietary systems Integrated Case Management SecureGRC is equipped with compliance case management framework which gives end to end visibility to security and compliance cases for the organizations which another example of true integration of Security and IT-GRC management. Audit Management What is Audit Management? Audit management is the overall process of managing the overall audit process. It enables organizations to reduce dependence on paper, perform the functions faster and with fewer resources and provides a trackable audit trail for these functions. Audit Manager SecureGRC Audit Management feature provides an integrated solution to managing the functions, documents and tasks associated with audits (IT, Security or Financial) of any organization. In addition, it provides access to the core elements from the SecureGRC platform such as Workflow, Document Management, Audit Work paper repository, Fine-grained access control through a secure Web based interface Key Features  Single and Centralized repository for all work papers TM SecureGRC
  • 2. Version control for all work papers  Link work papers to controls  Schedule audits  Assign personnel to audits  Audit trail Page | 2  Ability to track audit failures  Dashboards and reports Request for more ready to use kits Vendor Compliance Management SecureGRC Vendor Management solution enables you to manage an effective vendor management process: risk-based vendor selection, centralized document management, and remediation management. What is Vendor Management? Vendor Management is the process financial institutions worldwide use to understand the risks they assume due to their business relationships with their third-party vendors especially regarding their data sharing or outsourcing relationships. Vendor Management is a standard practice today and has matured to an extent where some leading financial industry groups such as BITS have standardized the process significantly through their Standard Information Gathering (SIG) and Agreed upon Procedures (AUP) standards. The usage of these standards or their derivatives helps organizations understand the risk associated with their vendors and then incorporate appropriate risk mitigation techniques and measures to mitigate the risk. Key Features  Automate monitoring of controls such as management of sensitive data and technical controls.  Enable vendor managers to manage risk.  Assess vendor risk using various assessment types and a library of questions based on best-practice standards.  Derive risk and compliance ratings by type of vendor from assessment results.  Measure vendor compliance to policies and procedures.  Track and address areas of non-compliance identified in the vendor assessment process. Merchant Compliance Management SecureGRC's merchant compliance management helps banks and financial institutes to ensure their merchants comply with the regulations applicable to their business. What is Merchant Management? According to VISA Acquirers are responsible for ensuring that all of their merchants comply with the PCI Data Security Standard (DSS) requirements And according to MasterCard TM SecureGRC
  • 3. MasterCard fundamentally views our member Acquirers as owning the acquiring payment channel. Given this perspective, MasterCard works to administer the SDP Program through our Acquirers, working with merchants to further secure the transaction infrastructure. Please note that acquirers themselves do not need to go through the SDP compliance process but they must manage the SDP process for their merchants. Merchant Management is the process that enables card acquirers to ensure that their merchants are compliant with the PCI Data Security Standard and thereby satisfy the demands of the various card brands. Page | 3 SecureGRC’s merchant management enables organizations (banks, acquirers, service providers etc. ) to manage the compliance of their merchants with the PCI DSS. Merchant management automates many of the manual tasks associated with the merchant compliance process. When organizations are dealing with thousands of merchants, the process of managing compliance could consume an enormous amount of resources, time and money. CMM enables organizations to reduce all of these by providing a single interface to all compliance processes through a universally accessible web based interface. Key Features  Automate monitoring of controls such as management of sensitive data and technical controls.  Enable vendor managers to manage risk.  Assess vendor risk using various assessment types and a library of questions based on best-practice standards.  Derive risk and compliance ratings by type of vendor from assessment results.  Measure vendor compliance to policies and procedures.  Track and address areas of non-compliance identified in the vendor assessment process Policy Management What is Policy Management? Policy management is the overall process of managing the plethora of policies, procedures, guidelines and other documents that are part of the governance framework and function in any organization. SecureGRC Policy Manager SecureGRC Policy Manager provides an integrated solution to managing all the policies, procedures, guidelines, or standards that are the basis of the governance framework at any organization. Policy Manager allows organizations to consolidate all their policies, store them in a central repository, measure the compliance with these policies, and view various statistics from a central dashboard. Policy Manager provides access to the core elements from the SecureGRC platform such as Workflow, Document Management, Policy Inventory, Fine-grained access control through a secure Web based interface. Key Features  Single and centralized repository for all policies  Version control for all policies and procedures  Monitor acceptance of policies  Out of the box policy and procedure templates  Ability to link policy and procedures to controls  Dashboards and reports TM SecureGRC
  • 4. Remediation tracking Asset and Vulnerability Management What is Asset and Vulnerability Management? Asset management involves discovering, identifying and classifying assets such as servers, desktops, laptops etc that are part of any organization. Due to the fact that most digital information that forms the basis for any Page | 4 Governance Risk Management and Compliance (GRC) process of any organization resides on assets, it is imperative that organizations manage their assets. Vulnerability Management consists of the ability to discover the vulnerabilities associated with assets and provide the data and insight necessary to manage the vulnerabilities through the use of direct fixes or application of compensating controls. SecureGRC Asset and Vulnerability Manager provides an integrated solution to managing the functions, data and tasks associated with assets and related vulnerabilities. Asset and Vulnerability Manager uses the core elements from the CC-GRC platform such as Workflow, Document Management, Controls and Asset repository, Fine-grained access control through a secure Web based interface. Key Features  Accurate asset discovery  Single and Centralized repository for all assets and vulnerabilities  Ability to link Assets to controls  Schedule audits  Scan for vulnerabilities remotely  Map assets and vulnerabilities to regulations  Remediation tracking  Dashboards and reports Compliance Scanning What is Compliance Scanning? SecureGRC's compliance scanning is a unique feature that allows scanning of data concerned with PCI compliance in various data stores. Compliance Scanner allows QSAs/Auditors and consultants to streamline and automate the process of evaluating PCI compliance during onsite engagements. Results from leading vulnerability scanners and application scanners, along with cardholder data search features are processed by the Compliance Scanner to pre-populate approximately half the controls of PCI DSS. Features of Compliance Scanner for QSAs include:  Easy interview wizard to walk QSAs through the entire process.  Automated search for cardholder data within servers and databases.  Automated mapping of application/network vulnerabilities (from leading security scanners) to “cardholder” assets and servers.  Automated firewall rule set analysis and mapping of faulty rule sets to PCI requirements.  Generation of Report on Compliance with more than half controls pre-populated with accurate data on cardholder systems, their vulnerabilities and misconfigured firewall rule sets. TM SecureGRC
  • 5. Key Features  SecureGRC Compliance Scanner helps QSAs save a significant amount of time and resources to perform PCI assessments.  It also improves consistency of assessments across people and time and can help demonstrate the quality needed by the PCI Council. Page | 5 Data Discovery What is Data Discovery? Finding credit card data is one of the key and initial steps needed for compliance with the Payment Card Industry (PCI) Data Security Standard (DSS). The standard clearly prohibits storage of card holder data in an unencrypted manner. SecureGRC Data Discovery addresses this key need and was one of the first comprehensive scanners that not only searches for credit card data on file systems, but also in most commercial and open source databases. Data Discovery rapidly helps define the scope of a PCI assessment or certification and helps concentrate the efforts of the assessment. It usually is an eye-opener for many organizations that are surprised by the unintended proliferation of credit card data within organizations once CDD scans their environment. Those discoveries help organizations control the storage of the data or implement means to encrypt the data. Key Features  Find unencrypted credit card data in ANY type of file - Word Documents, Excel Spreadsheets, PDFs, Access databases. CDD is not constrained by file types, rather it allows you to search the whole hard disk for credit card data  Find credit card data in network shares  Find credit card data across the WHOLE network from one location. CDD needs Microsoft Active Directory (AD) or Domain level credentials and using those credentials, you can search for card data on desktops, laptops, servers etc all from one location.  Convenience of searching from one place, no need to go to each desktop/laptop to search for data  Find credit card data in most popular commercial and open source databases such as Oracle, SQL Server, and MySQL etc.  Extremely fast and uses very few resources - network or CPU resources For details visit: www.eGestalt.com TM SecureGRC