2014 Digital Yearbook of Homeland Security Awards
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Agiliance –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RiskVision 7<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The biggest inhibitor <strong>of</strong> effective security and vulnerability<br />
management lies in the fact that the number <strong>of</strong><br />
threats to organizations has grown exponentially over nal resources. As a result, government organizations are<br />
the past few years. This is largely due to the increasing<br />
number <strong>of</strong> IT assets under management, which are tion, normalization, and business impact correlation.<br />
seeking technical solutions to automate data aggrega-<br />
creating a big data challenge. To ensure proper coverage,<br />
government organizations in many cases are relying ers have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />
The ultimate objective is to shorten the window attack-<br />
on multiple tools to produce the necessary vulnerability overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />
assessment data. This only adds to the volume, velocity,<br />
and complexity <strong>of</strong> data feeds that must be analyzed, achieving continuous monitoring and enabling them to<br />
is assisting civilian, defense, and intelligence agencies in<br />
normalized, and prioritized. Relying on human labor report on their organizations risk and security posture<br />
to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the in near real time. The company’s RiskVision s<strong>of</strong>tware<br />
main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security<br />
addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management<br />
Data Breach Investigations Report, 92% <strong>of</strong> breaches databases, vulnerability scanners, threat data feeds and<br />
were discovered by a third party and not through inter- advisory services, database security management, etc.<br />
18