Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:43 PM
Dark Reading
Dark Reading
Products and Releases

Agiliance Now Offers More Than 50 Data Connectors To Enable Real-Time Security Risk Intelligence And Remediation

Agiliance also introduced a new connector type called "Big Data"

Sunnyvale, Calif. - November 27, 2012 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs, today announced that it has expanded its portfolio of data connectors by more than 45 percent from just nine months ago. With more than 50 connectors, Agiliance Agiliance RiskVisionT provides the industry's broadest range of security data collection capabilities. This broad and deep information gathering infrastructure enables organizations to gain insights into their risk and compliance posture by aggregating and correlating data from otherwise silo-based security and IT tools.

The rising tide of insider and advanced persistent threats, mounting regulatory pressure, and the impact of big security data on an organization's operational efficiency have led many progressive organizations to adopt a "risk-based" approach to security. This approach encompasses continuous (security) monitoring and frequent data assessments (e.g., on a weekly basis). It also necessitates automated security data collection, aggregation, and normalization from a variety of sources such as security information and event management (SIEM), asset management, threat feeds, and vulnerability scanners.

The Agiliance RiskVision Connector portfolio protects an organization's investment in existing best-of-breed security and IT tools and provides for a broad coverage of categories:

Configuration and Patch Management BMC® BladeLogic Automation Connector, IBM® Tivoli Endpoint Manager Connector (formerly BigFix), IBM Internet Security Systems Proventia® Management SiteProtector Connector, NetIQ® Secure Configuration Manager Connector (Web Services), NetIQ Secure Configuration Manager Connector (Big Data), Solarwinds® Orion Network Configuration Manager Connector, Symantec® AltirisT Security eXpress Connector, McAfee® ePolicy Orchestrator Connector, Microsoft® System Center Configuration Manager (SCCM) Connector, Tripwire® Enterprise for Security Configuration Management Connector, CiscoWorks® Network Compliance Manager (NCM) Connector, and Symantec® BindViewT Connector

Ticket Management BMC RemedyT Connector, HP® Service Manager Connector (formerly Peregrine), IBM Maximo Connector, and ServiceNow® Connector

Vulnerability Scanners - Assets DISA Gold Disk / Unix SRR Connector, eEye Digital Security® Retina Network Security Scanner Connector, Checklist Connector, McAfee Vulnerability Manager Connector, nCircle IP360T for Vulnerability Connector (Web Services), nCircle IP360 for Vulnerability Connector (Big Data), Qualys® QualysGuard® Vulnerability Connector (Web Services), Qualys QualysGuard Vulnerability Connector (Big Data), Skybox Security® Risk Exposure Analyzer Connector, Tenable Network Security® Nessus Connector (Web Services), Tenable Network Security Nessus Connector (Big Data), Rapid7® Nexpose Enterprise Connector, and RedSeal Networks® Vulnerability Advisor Connector

Vulnerability Scanners - Applications HP WebInspect Connector, IBM Rational AppScan Connector, HP Fortify Connector, and Veracode® Connector

Threat and Vulnerability Data Feeds / Advisory Services National Vulnerability Database (CPE, CVE, CWE) Connector (Web Services), National Vulnerability Database (CPE, CVE, CWE) Connector (Big Data), and VeriSign® iDefense® Security Intelligence Services Connector

Event and Incident Management HP ArcSight ESM Connector (Web Services), HP ArcSight ESM Connector (Big Data), Symantec Endpoint Protection Manager, BMC Remedy to Incident Connector, and Microsoft Exchange Event Management Connector

Data Loss Prevention Symantec DLP Connector (formerly Vontu)

Configuration Management Database BMC Atrium Connector, Microsoft Active Directory Connector, Symantec Altiris Asset Management Suite Connector, and HP Service Manager for Asset Management Connector

Application / Database Scans Application SecurityT AppDetectiveProT Connector and Application Security DbProtectT Connector

Generic Technology Agiliance Generic Database (SQL) Connector, Agiliance Generic Flat File Connector, and Agiliance Generic Web Services Connector

In addition to extending its connector portfolio, Agiliance also introduced a new connector type called "Big Data"; these are built specifically for big data performance scalability.

"With more than 50 data connectors, Agiliance has set a new standard for interconnecting otherwise silo-based security and IT tools," said Torsten George, vice president of worldwide marketing and products at Agiliance. "This breadth of Agiliance Connectors allows organizations to reduce costs by unifying data feeds from point products, streamlining monitoring processes, and creating situational awareness of threats. By gathering historic trend data Agiliance RiskVision also supports predictive security analysis in today's big data environments."

Connectors for Agiliance RiskVision are priced at US $15,000 each. Please visit the Agiliance website for more details.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance RiskVision enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision's configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.