Other RiskVision Applications

Other RiskVision applications are listed in the table below:

ICON
APPLICATION
DESCRIPTION
Compliance ManagerRiskVision Application enables an organization to effectively manage and measure compliance programs across multiple regulations, standards, and frameworks. It also automates the compliance process through general computer controls (GCC) and questionnaires. The evidence and control results can be automatically collected through connectors or questionnaire results from business users. RiskVision Application enables data classification, ownership configuration, compliance assessment, mitigation, and reporting. It supports popular frameworks, standards, and regulations such as ISO 27002, CIS, HIPAA and PCI, and others. Compliance Manager improves process efficiency and integrity as well as data quality and reliability.
Vendor Risk ManagerRiskVision Application enables organizations to audit and manage third-party risks, as mandated by regulations and standards such as ISO 27001, PCI, and FISMA. RiskVision Application classifies, assesses, and reports on third-party risk based on the standard control framework from shared assessment programs or an organization's custom control framework. It provides a portal where vendors participate in assessments and the results are retrieved by an organization's risk analysts. Vendors are classified automatically into appropriate tiers and applicable controls are applied based on the vendor tier. Powerful delegated administration and automation features enable RiskVision Application to scale to large vendor populations.
Threat and Vulnerability ManagerRiskVision Application enables organizations to consolidate their threat and vulnerability programs onto a single platform. RiskVision Application integrates with vulnerability and early warning data feeds from iDefense and National Vulnerability. It correlates these vulnerability data feeds with vulnerability scanner results to eliminate false positives and report incidents. Inferred scans are performed by correlating the vulnerability data feeds to a company's RiskVision asset database mitigating risks for assets not reachable by vulnerability scanners. Once detected, vulnerabilities are assessed and remediated using the system's workflow for true closed-loop vulnerability management.
Policy ManagerRiskVision Application enables the management of enterprise policies on a single centralized platform. Organizations can enforce policy and process standards across different locations, departments, and programs. RiskVision Application supports simultaneous policy editing across multiple stakeholders using a rich WYSIWYG user interface. An organization can automate processes for policy authoring, reviewing and approval. Policy templates help enforce consistent formatting and structure. It has a highly configurable workflow enabling an organization to enforce change control and maintain accountability and it supports policy awareness campaigns with policy distribution, attestation, and comprehension testing tools.
Incident ManagerRiskVision Application enables organizations to collect, classify, and manage multiple IT and non-IT incidents. It is a single collection point for all the incidences that are manually and automatically reported. It imports incidents reported from most monitoring systems and scanners as well as Security Incident Management (SIM) solutions. All incidents, including business, operational, and environmental can be reported using the incident-reporting portal. Incidents are assessed based on configurable workflow and automatically created and classified based on rules that are tracked throughout the incident's lifecycle. Incidents are tied to controls, policies, and risk to provide closed-loop feedback for policy and control assessment and risk monitoring. Incidents are rated based on their criticality so that organizations can respond based on the impact to the business.