Other RiskVision Applications

Other RiskVision applications are listed in the table below:

IconApplicationDescription
Compliance ManagerCompliance Manager allows organizations to effectively manage and measure compliance programs across multiple regulations, standards, and frameworks. It also automates the compliance process through general computer controls (GCC) and questionnaires. The evidence and control results can be automatically collected through connectors or questionnaire results from business users. Copmliance enables data classification, ownership configuration, compliance assessment, mitigation, and reporting. It supports popular frameworks, standards, and regulations such as ISO 27002, CIS, HIPAA and PCI, and others. Compliance Manager improves process efficiency and integrity as well as data quality and reliability.
Enterprise Risk ManagerEnterprise Risk Manager is a comprehensive risk lifecycle management solution. Organizations can use this application to identify, assess, and mitigate risks using an appropriate risk treatment plan. Its flexible risk model supports both qualitative and quantitative methodologies, including the calculation of inherent risk, current risk, and residual risk within the context of mitigating controls. It features rich reports and dashboards, as well as easy to use risk assessment tools and will help your orgnization understand and monitor its enterprise risk posture. Enterprise Risk Manager includes out-of-the-box support for popular risk methodologies, such as COSO, AZ/NZS 4360 and ISO.
Threat and Vulnerability ManagerThreat and Vulnerability Manager will help you consolidate your threat and vulnerability programs onto a single platform. It integrates with vulnerability and early warning data feeds from iDefense and National Vulnerability, and correlates these feeds with vulnerability scanner results to eliminate false positives and report incidents. Inferred scans are performed by correlating the vulnerability data feeds to a company's RiskVision asset database, mitigating risks for assets not reachable by vulnerability scanners. Once detected, vulnerabilities are assessed and remediated using the system's workflow for true closed-loop vulnerability management.
Policy ManagerPolicy Manager enables the management of enterprise policies on a single centralized platform. Organizations can enforce policy and process standards across different locations, departments, and programs. It supports simultaneous policy editing across multiple stakeholders using a rich WYSIWYG user interface. An organization can automate processes for policy authoring, reviewing and approval. Policy templates help enforce consistent formatting and structure. It has a highly configurable workflow enabling an organization to enforce change control and maintain accountability and it supports policy awareness campaigns with policy distribution, attestation, and comprehension testing tools.
Incident ManagerIncident Manager helps organizations collect, classify, and manage multiple IT and non-IT incidents. It is a single collection point for all incidents that are manually and automatically reported. It imports incidents reported from most monitoring systems and scanners, as well as Security Incident Management (SIM) solutions. All incidents, including business, operational, and environmental, can be reported using the incident-reporting portal. Incidents are assessed based on configurable workflows and automatically created and classified based on rules that are tracked throughout the incident's lifecycle. Incidents are tied to controls, policies, and risk to provide closed-loop feedback for policy and control assessment and risk monitoring. Incidents are rated based on their criticality so that organizations can respond based on the impact to the business.