TraceCSO Hosted Service Automates Network Security Compliance Tasks

 
 
By Frank Ohlhorst  |  Posted 2012-10-09
 
 
 

Initial Set-Up

An initial set-up wizard walks users through the set-up procedure—adding users and departments, defining permissions and roles, coordinating network scanning, selecting authority documents and offering a quick tour of TraceCSO. Users can exit and return to this set-up at any time.

Initial Set-Up

Risk Management

The Risk Assessment is the cornerstone for setting up and managing an organization’s information security program. The assessment establishes the necessary controls to properly mitigate the organization’s risk and provides the framework to integrate and automatically populate data across all of the functional areas of TraceCSO.

Risk Management

Risk Scoring

TraceSecurity’s proprietary Risk Scores enable an organization to identify risk levels, measure and report effectiveness over time, set benchmarks and analyze trends. Risk Scores enable organizations to make better decisions and optimize budgets.

Risk Scoring

Ticketing

A robust ticketing system distributes work across the organization and allows accountability and oversight for the implementation and adherence to processes, policies, vulnerability remediation and training.

Ticketing

Control Management

Risk mitigation controls can be technical, policy, process or training in nature. These controls are linked to all functional areas within TraceCSO. This integration allows TraceCSO to automatically detect that controls have been implemented properly.

Control Management

Vulnerability Management

Authenticated scanning identifies network vulnerabilities, and configuration scanning automates the documentation of operating system configuration and application controls compliance with industry regulations.

Vulnerability Management

Automated Control Auditing

Control verification is automatically updated with data from all areas of the software, eliminating the need for an auditor to manually verify controls, increasing audit accuracy and reducing audit time.

Automated Control Auditing

Security Policy Compliance

Through the application of built-in best practices, TraceCSO places priority on your organization’s information security and leads your organization down a path of compliance by default. Data is automatically pre-populated from other areas of the software, leaving very little manual work to be completed in the compliance review process.

Security Policy Compliance

Risk Dashboard

Dashboards enable organizations to quickly access its Risk Score and as a result, prioritize risk reduction efforts, measure mitigation effectiveness and analyze trends.

Risk Dashboard

Summary Dashboard

TraceCSO dashboards are customizable, allowing users to drill down and filter for custom bottom-up or top-down visibility and role-based reporting.

Summary Dashboard

Rocket Fuel