Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
OVERLAND PARK, KS -- (Marketwire) -- 11/15/12 -- LockPath, a provider of innovative governance, risk management and compliance (GRC) applications, today announced the release of version 3.0 of its Keylight platform. Keylight 3.0 delivers unmatched reporting capabilities, substantial content integration innovations and advanced assessment abilities.
The redesigned user interface simplifies reporting and allows permitted users to report on all data and quickly generate a variety of charts for stakeholders. With real-time data previews, users can instantly see their report take shape as they drag and drop fields, flatten reports, apply filters and sort criteria leveraging the full-screen work area.
"The reporting advances in Keylight 3.0 give our customers unmatched capabilities for analyzing, understanding and communicating results -- whether it's a specific information security initiative or the most mature GRC program -- at every level of their organization," said Chris Goodwin, co-founder and CTO of LockPath. "LockPath continues to deliver powerful features that actually work in real-world environments -- alleviating organizations' pent-up frustration with the ineffective GRC platforms of the past."
Delivering unparalleled data integration and correlation through LockPath's patent-pending Dynamic Content Framework (DCF), a highly scalable and flexible content engine, Keylight 3.0 gives users the ability to create custom tables and fields in the Keylight Vendor Manager application via the DCF. New to this release, users can also use formulas inside record fields to automatically calculate risk levels from aggregated data. They can also issue assessments to quickly identify risk items for remediation against particular assets. Further streamlining GRC efforts, users can apply pre-defined filters and sorting criteria to lookup fields, insert direct hyperlinks into documents to create new records and auto-provision new users while creating a record.
"IT GRC is a market in transition," notes Gartner Research Senior Analyst Paul in the 2012 GRC Hype Cycle. "IT GRC can improve an organization's ability to analyze IT risk, add business context to security assessments, support internal and external audits, and reduce compliance-reporting costs. Organizations can reduce compliance-reporting costs by applying IT GRC automation to the management of written policy content, the assessment of process-oriented controls and the audit of technical configuration settings... Organizations also may take advantage of the benefits of control transparency to move toward the ideal of using better risk management to affect corporate performance."
Assessment capabilities have also been significantly enhanced. Users can now:
Additional Keylight 3.0 advancements include:
"Thanks to our team of experienced technologists, we set the standard for innovation in the GRC industry," concluded Chris Caldwell, co-founder and CEO of LockPath. "Keylight 3.0 continues our tradition of delivering industry firsts to ensure GRC technology keeps pace with our customers' changing business and IT demands."
Keylight 3.0 is available immediately. To schedule a demo, visit LockPath.com or call 913-601-4800.
About LockPath
LockPath speeds and improves organizations' business and risk decision making. Its purpose-built Keylight platform correlates data, policies, procedures and assets from numerous sources to provide a comprehensive information security management system (ISMS) and IT government, risk and compliance (GRC) reporting across any organization. Forward-thinking product design is recognized by analysts and leading industry publications/awards as the next generation of IT GRC. LockPath is headquartered in Kansas City. Visit LockPath.com to learn more.
Carole Hutchinson
BluePoint Venture Marketing
781-861-7800 Ext. 703
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs