21.01.2016 Views

The GSN 2015 Digital Yearbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Agiliance Inc.<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7.5<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> biggest inhibitor of effective security and vulnerability<br />

management lies in the fact that the number of<br />

threats to organizations has grown exponentially over<br />

the past few years. This is largely due to the increasing<br />

number of IT assets under management, which are<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying<br />

on multiple tools to produce the necessary vulnerability<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity of data feeds that must be analyzed,<br />

normalized, and prioritized. Relying on human labor<br />

to comb through mountains of data logs is one of the<br />

main reasons that critical vulnerabilities are not being<br />

addressed in a timely fashion. According to the Verizon<br />

Data Breach Investigations Report, 92% of breaches<br />

were discovered by a third party and not through internal<br />

resources. As a result, government organizations are<br />

seeking technical solutions to automate data aggregation,<br />

normalization, and business impact correlation.<br />

<strong>The</strong> ultimate objective is to shorten the window attackers<br />

have to exploit a software flaw, thereby reducing the<br />

overall risk of cyber-attacks and insider threats. Agiliance<br />

is assisting civilian, defense, and intelligence agencies in<br />

achieving continuous monitoring and enabling them to<br />

report on their organizations risk and security posture<br />

in near real time. <strong>The</strong> company’s RiskVision software<br />

gathers data feeds from otherwise silo-based security<br />

and IT tools such as SIEMs, configuration management<br />

databases, vulnerability scanners, threat data feeds and<br />

advisory services, database security management, etc.<br />

68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!