Agiliance Now Offers More Than 50 Data Connectors To Enable Real-Time Security Risk Intelligence And Remediation

Agiliance also introduced a new connector type called "Big Data"

November 30, 2012

4 Min Read


Sunnyvale, Calif. - November 27, 2012 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs, today announced that it has expanded its portfolio of data connectors by more than 45 percent from just nine months ago. With more than 50 connectors, Agiliance Agiliance RiskVisionT provides the industry's broadest range of security data collection capabilities. This broad and deep information gathering infrastructure enables organizations to gain insights into their risk and compliance posture by aggregating and correlating data from otherwise silo-based security and IT tools.

The rising tide of insider and advanced persistent threats, mounting regulatory pressure, and the impact of big security data on an organization's operational efficiency have led many progressive organizations to adopt a "risk-based" approach to security. This approach encompasses continuous (security) monitoring and frequent data assessments (e.g., on a weekly basis). It also necessitates automated security data collection, aggregation, and normalization from a variety of sources such as security information and event management (SIEM), asset management, threat feeds, and vulnerability scanners.

The Agiliance RiskVision Connector portfolio protects an organization's investment in existing best-of-breed security and IT tools and provides for a broad coverage of categories:

Configuration and Patch Management BMC® BladeLogic Automation Connector, IBM® Tivoli Endpoint Manager Connector (formerly BigFix), IBM Internet Security Systems Proventia® Management SiteProtector Connector, NetIQ® Secure Configuration Manager Connector (Web Services), NetIQ Secure Configuration Manager Connector (Big Data), Solarwinds® Orion Network Configuration Manager Connector, Symantec® AltirisT Security eXpress Connector, McAfee® ePolicy Orchestrator Connector, Microsoft® System Center Configuration Manager (SCCM) Connector, Tripwire® Enterprise for Security Configuration Management Connector, CiscoWorks® Network Compliance Manager (NCM) Connector, and Symantec® BindViewT Connector

Ticket Management BMC RemedyT Connector, HP® Service Manager Connector (formerly Peregrine), IBM Maximo Connector, and ServiceNow® Connector

Vulnerability Scanners - Assets DISA Gold Disk / Unix SRR Connector, eEye Digital Security® Retina Network Security Scanner Connector, Checklist Connector, McAfee Vulnerability Manager Connector, nCircle IP360T for Vulnerability Connector (Web Services), nCircle IP360 for Vulnerability Connector (Big Data), Qualys® QualysGuard® Vulnerability Connector (Web Services), Qualys QualysGuard Vulnerability Connector (Big Data), Skybox Security® Risk Exposure Analyzer Connector, Tenable Network Security® Nessus Connector (Web Services), Tenable Network Security Nessus Connector (Big Data), Rapid7® Nexpose Enterprise Connector, and RedSeal Networks® Vulnerability Advisor Connector

Vulnerability Scanners - Applications HP WebInspect Connector, IBM Rational AppScan Connector, HP Fortify Connector, and Veracode® Connector

Threat and Vulnerability Data Feeds / Advisory Services National Vulnerability Database (CPE, CVE, CWE) Connector (Web Services), National Vulnerability Database (CPE, CVE, CWE) Connector (Big Data), and VeriSign® iDefense® Security Intelligence Services Connector

Event and Incident Management HP ArcSight ESM Connector (Web Services), HP ArcSight ESM Connector (Big Data), Symantec Endpoint Protection Manager, BMC Remedy to Incident Connector, and Microsoft Exchange Event Management Connector

Data Loss Prevention Symantec DLP Connector (formerly Vontu)

Configuration Management Database BMC Atrium Connector, Microsoft Active Directory Connector, Symantec Altiris Asset Management Suite Connector, and HP Service Manager for Asset Management Connector

Application / Database Scans Application SecurityT AppDetectiveProT Connector and Application Security DbProtectT Connector

Generic Technology Agiliance Generic Database (SQL) Connector, Agiliance Generic Flat File Connector, and Agiliance Generic Web Services Connector

In addition to extending its connector portfolio, Agiliance also introduced a new connector type called "Big Data"; these are built specifically for big data performance scalability.

"With more than 50 data connectors, Agiliance has set a new standard for interconnecting otherwise silo-based security and IT tools," said Torsten George, vice president of worldwide marketing and products at Agiliance. "This breadth of Agiliance Connectors allows organizations to reduce costs by unifying data feeds from point products, streamlining monitoring processes, and creating situational awareness of threats. By gathering historic trend data Agiliance RiskVision also supports predictive security analysis in today's big data environments."

Connectors for Agiliance RiskVision are priced at US $15,000 each. Please visit the Agiliance website for more details.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance RiskVision enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision's configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights