Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/10/2012
11:38 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LockPath Releases Version 2.3 Of Keylight Platform

Keylight 2.3 gives users more flexibility when importing data into Dynamic Content Framework (DCF) tables

OVERLAND PARK, Kan., April 10, 2012 – LockPath, a provider of innovative governance, risk and compliance (GRC) applications, today announced the release of version 2.3 of the Keylight platform. Keylight 2.3 gives users more flexibility when importing data into Dynamic Content Framework (DCF) tables, significantly strengthens Keylight Threat Manager, and adds the latest United Compliance Framework (UCF) content.

With Keylight 2.3, users have the ability to upload data files (.xls and .csv) and import them directly into DCF tables. In addition, Threat Manager now displays vulnerability scan reports within a DCF table, allowing users to easily assign vulnerability tasks and track remediation items via workflow. Threat Manager now also dynamically pulls in the latest vulnerability results from the Qualys Detection API on a scheduled interval, providing differential imports, de-duplicating vulnerability data and significantly reducing import processing time and bandwidth requirements.

“LockPath has developed a next generation GRC platform, and the seamless integration with the QualysGuard cloud platform will streamline the tedious process of collecting and presenting security and compliance data for IT-GRC,” said Philippe Courtot, chairman and CEO of Qualys.

Continuing its market leadership in UCF and Shared Assessments content integration and harmonization, version 2.3 of the Keylight Platform incorporates the UCF’s Q1 2012 content update, which includes NIST 800-53 revision 3.

Other enhancements in Keylight 2.3 include:

Reporting and Dashboards: Users can now generate detailed reports to display the mapping relationships between controls and business units, controls and Compliance Documents, Authority Documents and business units, and Authority Documents and citations. There is also a new system dashboard report portlet, which displays a pie chart of the percentage of controls that are currently mapped to a Compliance Document versus controls that are not mapped. Keylight Compliance Manager: In addition to more easily mapping controls and audit items to citations, users can now select an Authority Document Issuer when creating a new Authority Document and run reports filtered by those issuers. Managing assessments is also easier now, as users can copy an assessment template and view assessment questions linked to controls. Version 2.3 also offers the option for point- and percentage-based assessment scoring labels when creating the template, and users can report on assessment score labels. Email Templates: Users can now quickly access and fully customize email templates for awareness events and vendor contact account alerts.

“LockPath is committed to delivering the most innovative GRC platform on the market,” noted Chris Goodwin, co-founder and CTO of LockPath. “Thanks to its inherent flexibility, we can continually update the Keylight platform and quickly bring significant enhancements to market. LockPath offers a new way for companies to effectively manage GRC initiatives that can keep pace with today’s fast-paced risk and compliance environment.”

For more information on the Keylight platform, please download the datasheet or call 913-601-4800.

About LockPath

LockPath helps companies of all sizes address the increasingly complex issues of regulatory compliance and risk management. Its innovative software provides keen insight by correlating security information from multiple data sources with current regulations and policies to gauge risk. Easy to install and manage, the Keylight platform empowers people at every level in an organization to take control and make better business decisions. LockPath is headquartered in Kansas City. Please visit www.lockpath.com to learn more.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...