Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:33 PM
Dark Reading
Dark Reading
Products and Releases

MEGA Introduces Advanced GRC Solution

MEGA GRC Suite Version 3.1 includes advanced risk capabilities and compliance and control features to meet new reporting requirements

MEGA, the company that provides integrated governance, risk, and compliance (GRC) and business process analysis (BPA) software solutions, has introduced the MEGA GRC Suite Version 3.1. The capabilities of the platform and the Suite modules - GRC Audit, GRC Compliance and Control, and GRC Risk - have been augmented and enhanced to provide an even more complete and flexible solution that addresses critical issues facing large corporations in today's troubling economy.

MEGA was named by Forrester Research as a leader in The Forrester Wave(tm): Business Process Analysis, Enterprise Architecture (EA) Tools, and IT Planning, Q1 2009. In addition, the MEGA GRC Suite was named as the best solution for integrated risk management and control by Yphise in its January 2009 Integrated Risk Management and Control report that contains a detailed analysis, comparison, and assessment of risk management and control software products.

This new version of the MEGA GRC Suite offers:

* Ways to improve audit quality and enhance business decision capability * Advanced risk features to manage both global and local risks * Compliance and control additions to meet new reporting requirements * A host of new platform tools for increased productivity

The new MEGA GRC Audit module has been designed to solve several pressing issues for internal auditors. The software guarantees the audit trail and quality through increased capacity for reporting and follow-up thanks to a secure Web-based collaborative environment involving all necessary stakeholders. This enables internal auditors to ensure that their earlier recommendations have been implemented. In most companies, audit functions have expanded beyond financial and compliance issues to include assessment and control of business and governance risks; this new module gives auditors the tools to manage this larger role and improve the effectiveness of risk management, control, and governance processes. The MEGA software also increases audit productivity by standardizing best practices and optimizing available resources to accommodate the mounting workloads facing auditors.

"Using numerous office tools, such as spreadsheets and email, we faced the difficulty of managing an increasing volume of information exchanges and data. MEGA GRC Audit provides the ability to address this challenge, by facilitating the storage of information and the audit trail. In addition it ensures a common practice thanks to the use of a single tool for audit management," said Jean Marc Ferjoux, GRC project manager at Renault Group.

MEGA GRC Compliance and Control has extended self-assessment features for evaluation management, provides ergonomic improvements such as direct access to the "to do list", and simpler questionnaires ensuring that periodic compliance and control surveys are easily completed. It also includes an improved means to manage and correct deficiencies by grouping the action plans.

The new MEGA GRC Risk module has improved reporting capability, including Basel II reports and the option to manage both global and local risks through a consolidated risk evaluation overview.

The MEGA GRC Suite and the MEGA Modeling Suite for enterprise architecture and business process analysis are supplemented by nearly 20 years of process expertise from MEGA's international team of consultants who support internal auditors, compliance officers, and risk managers.

The GRC Suite became available to customers January 15, 2009.

About MEGA MEGA provides enterprise architecture, business process analysis, and governance, risk, and compliance solutions, with 70,000 users worldwide. Clients include AT&T, DirecTV, Morgan Stanley, NASA, Nissan, and Wyeth, and the US Departments of Agriculture, Homeland Security, and Transportation. www.mega.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
PUBLISHED: 2021-04-13
XML External Entity Resolution (XXE) in Helix ALM. The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks through 6.8. There is a possible stack overflow in dhcp server.
PUBLISHED: 2021-04-13
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1