Relational Security Unveils 5.0Relational Security Unveils 5.0
Relational Security launched its much anticipated RSAM v5.0
February 7, 2007
SAN FRANCISCO -- Relational Security Corporation, which provides best of breed risk assessment/management and compliance software to assist Fortune 1000 clients with their governance, risk and compliance initiatives, launched today at the RSA Conference 2007 its much anticipated RSAM™ v5.0. This new version of RSAM™ provides many great enhancements to the existing RSAM™ v4.5 feature set, while also integrating with Relational Security’s powerful new assessment & reporting modules.
“As risk and compliance assessments become more and more business critical and as regulations and standards become more comprehensive, assessment requirements have evolved beyond checklists, spreadsheets and automated scanning tools,” said Vivek Shivananda, President and Chief Executive Officer. “Today, effective risk & compliance assessments must analyze data related to administrative, physical, operational and technical controls, relational risks and criticality factors, business impact, and compliance requirements. The 5.0 release of our RSAM™ product further builds on our solid framework and provides the market with what it has been looking for - an easy mechanism to gather and track ad-hoc assessment findings along with survey/template based assessment data.”
Relational Security’s flagship 5th generation product, RSAM™, is built on an open and flexible framework that quickly adapts to any institution’s environment. RSAM™ blends an intuitive multi-user, web-based interface with practical, enhanced risk assessment methodology that can be used to assess risks, controls, and the compliance of technical, physical, and administrative assets, business functions, processes and more. The underlying principle of the RSAM™ technology is to gather intelligent and consistent information to help institutions qualify and quantify risk based on business criticality and compliance requirements. Simple, practical and actionable reports are easy to interpret at the executive, management and technical levels, making it easy to identify gaps & prioritize remediation opportunities.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023