Risk
2/28/2014
07:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TraceSecurity Enhances TraceCSO To Simplify IT GRC Management

Customers will see improvements in key features, new functionality, and other enhanced performance metrics

San Francisco, CA – RSA Conference – February 25, 2014

TraceSecurity, the pioneer in cloud-based IT governance, risk and compliance (GRC) solutions, continues its strategy of bringing simplicity to organizations faced with managing security threats, and the governance and compliance mandates that accompany them. In March, TraceCSO customers will see improvements in key features, new functionality and other enhanced performance metrics.

TraceSecurity development engineers have focused on four key areas in today's update. They include:

· Business object reporting – TraceCSO has added a layer of business object reporting on top of its risk assessment module, translating IT content into a form that is more easily consumable across business organizations. Assets are associated with business objects, delivering better categorization of risks and showcasing the potential damaging effects of identified risks in a context that communicates well with non-IT decision makers.

· Vendor questionnaires and surveys – This inline capability streamlines and automates the often onerous process of collecting security information from vendors. The feature ensures that results are consistent and can be reported in aggregate, eliminating errors and delivering added visibility into vendor relationships for decision makers.

· Remediation Planning – This enhancement is particularly well suited for small- and mid-sized organizations with limited IT personnel. The workflow feature, designed using industry standard, rules-based best practices, guides users through the decision-making process for every risk. Organizations can define the criteria by which a risk requires action, taking the necessary steps to manage visits within acceptable parameters.

· Partner efficiencies – TraceSecurity is making it easier for its MSSP partners and resellers to better serve their clients. Enhanced features allow partners to pre-set content for clients, making it easier to configure implementations and deliver a faster and more complete "out-of-the-box experience" for new customers.

"The goal of these new features is to take the risk out of risk management," said Josh Stone, director of product management at TraceSecurity. "We're working every day to simplify information security management for industries already challenged with high costs associated with IT infrastructures, a shortfall in security specialists, and rapidly changing regulatory mandates."

TraceSecurity has modified other aspects of the TraceCSO software suite to ensure continued ease-of-use and customer satisfaction. These include:

· Numerous screens were enhanced to increase performance and add configurable fields. This allows clients to tune the interface to achieve greater simplicity and enable optional, advanced features.

· TraceCSO supports both high-demand users and others seeking a more simplistic solution. Screens can now be customized to show only the fields necessary to support unique customer requirements.

· Today's TraceCSO is also significantly faster than earlier iterations, in some cases improving page loads by as much as 8 to10 times.

TraceCSO is the industry's first cloud solution for a holistic and risk-based information security program that delivers comprehensive visibility and accountability for improved risk and compliance profiles across all areas of an organization. TraceCSO allows organizations of any size, industry or security skill set to evaluate, create, implement and manage a comprehensive risk-based information security program, to protect their organizations from today's top information security risks. Launched just over a year ago, TraceCSO has been implemented for some 250 clients, across industries including financial services, healthcare, education, legal, technology and government.

About TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions. The company's cloud-based services help organizations achieve, maintain and demonstrate security compliance while significantly improving their security posture. With more than 1,700 customers, TraceSecurity supports the security and risk management efforts of organizations in financial services, healthcare, high-tech, insurance, government, education and other regulated sectors. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, La. For more information, call (225) 612-2121 or visit www.tracesecurity.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.