19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Agiliance –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The biggest inhibitor <strong>of</strong> effective security and vulnerability<br />

management lies in the fact that the number <strong>of</strong><br />

threats to organizations has grown exponentially over nal resources. As a result, government organizations are<br />

the past few years. This is largely due to the increasing<br />

number <strong>of</strong> IT assets under management, which are tion, normalization, and business impact correlation.<br />

seeking technical solutions to automate data aggrega-<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying ers have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />

The ultimate objective is to shorten the window attack-<br />

on multiple tools to produce the necessary vulnerability overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity <strong>of</strong> data feeds that must be analyzed, achieving continuous monitoring and enabling them to<br />

is assisting civilian, defense, and intelligence agencies in<br />

normalized, and prioritized. Relying on human labor report on their organizations risk and security posture<br />

to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the in near real time. The company’s RiskVision s<strong>of</strong>tware<br />

main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security<br />

addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management<br />

Data Breach Investigations Report, 92% <strong>of</strong> breaches databases, vulnerability scanners, threat data feeds and<br />

were discovered by a third party and not through inter- advisory services, database security management, etc.<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!