Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

12/23/2013
10:05 AM
50%
50%

eGestalt To Launch New Risk Management Module For Its Aegify IT Security & Compliance Solution

Aegify Risk Manager enables complete work flow automation to comprehensively address and manage business security, compliance, and risk needs

SANTA CLARA, CA (PRWEB) -- December 23, 2013 -- Call it a victory for strategic vs. 'check off the boxes' tactical IT security and compliance. Today, eGestalt Technologies announced it has added a risk management module, Aegify Risk Manager, that can be deployed with the award-winning company's cloud-based SaaS Aegify Security Posture Management (SPM) and Compliance solutions to enable an enterprise to strategically identify business-critical assets, continually assess the assets' security vulnerability, and, if necessary, fix security loop-holes and remediate based upon a rational, prioritized risk-benefit analysis achieved via rules and automated data inputs and assessments.

"Whether in healthcare, financial services, retail, e-commerce, or government markets, today's small, medium and large enterprises face security threats and must meet compliance obligations under HIPAA, HITECH, SOX, PCI-DSS, GLBA, FISMA – or else face significant fines," said Michael Osterman of Osterman Research. "With eGestalt adding a risk management service module to its cloud-based SaaS Aegify SPM and Compliance solutions, an enterprise can cost-effectively achieve automated, 24/7 IT security monitoring and achieve compliance in a strategic manner that allows the head of IT to readily justify security expenditures to the CEO. This is an important aid in helping senior decision makers to determine how IT security affects business and the bottom line."

eGestalt offers its comprehensive, unified, continuous end-to-end automated IT security, compliance and risk management Aegify solution to managed service providers (MSPs) and value-added resellers (VARs).

Anupam Sahai, co-founder and president, eGestalt Technologies, said: "The Aegify Risk Manager represents a complete risk management solution that is cost-effective, completely automated, and integrated with the Aegify security and compliance management services. The Risk Manager leverages an expert system-based approach saving time and resources, while obviating the need of being an expert in the field."

Aegify Security, Compliance and Risk Management Features & Benefits

Aegify enables complete work flow automation to comprehensively address and manage business security, compliance and risk needs. Aegify Risk Manager features:

o Continuous Compliance Management Extensible with Built-in Frameworks -- Supports HIPAA Omnibus, GLBA, SANS20 and many other regulations.

o Continuous Security Posture Management – Enables IT asset discovery, vulnerability analysis and remediation

o Continuous Advanced Risk Management – Prioritizes security and compliance gaps using advanced expert systems-based approach that automates mapping of security posture to compliance controls. Built-In Risk Profile Database leverages industry best practices in risk management for organization risk score calculation within minutes and in real-time.

o Built-In Knowledge Base demystifies standards, while Policies Templates and Contracts can be easily customized with easy access to industry based practices

"As a practicing physician and one of the principals of a medical practice group, I'm focused primarily on the quality of patient care, and while I recognize IT security and compliance is a necessity to protect patient data, IT security and compliance has been a kind of 'black box' to me and I have it managed by one of my office managers," said Dr. Steven Krems, a principal of Access Medical Group in Marina del Rey, Calif., which has for 20 consecutive years served the Los Angeles Clippers of the National Basketball Association. "With a cost-effective and transparent IT security, compliance and risk management offering made available by eGestalt, I like that my IT manager can readily explain to me specifics as to why monies need to be allocated to protect patient data and achieve compliancy."

Aegify Pricing

Aegify modules are available via managed service providers and VARs, with eGestalt establishing a suggested retail price starting from $1,200/year to $9,000/year and higher depending on service edition and service levels. The eGestalt solution fits a 'pay as you grow' business model.

For information about pricing and how to become a channel partner to sell any or all of the Aegify solutions, send an email to: [email protected]

About eGestalt:

Launched in 2009, eGestalt Technologies is a leading provider of Cloud-based software-as-a-service (SaaS) solutions for business IT security monitoring, vulnerability analysis, asset and risk management, penetration testing and compliance management. The company's flagship product Aegify is the world-first, software only solution for integrated security posture management (SPM), compliance management and risk management and eGestalt is completely channel-focused. Headquartered in Santa Clara, Calif., eGestalt has offices in the United States, Asia-Pacific and Middle East. eGestalt was named a 2013 'Emerging Vendor' by CRN and UBM Channel and Winner of TiE50 2013, a prestigious award for enterprising technology startups worldwide.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3738
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
CVE-2019-3739
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
CVE-2019-3740
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
CVE-2019-3756
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions.
CVE-2019-3758
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.