Relational Security launched its much anticipated RSAM v5.0
SAN FRANCISCO -- Relational Security Corporation, which provides best of breed risk assessment/management and compliance software to assist Fortune 1000 clients with their governance, risk and compliance initiatives, launched today at the RSA Conference 2007 its much anticipated RSAM™ v5.0. This new version of RSAM™ provides many great enhancements to the existing RSAM™ v4.5 feature set, while also integrating with Relational Security’s powerful new assessment & reporting modules.
“As risk and compliance assessments become more and more business critical and as regulations and standards become more comprehensive, assessment requirements have evolved beyond checklists, spreadsheets and automated scanning tools,” said Vivek Shivananda, President and Chief Executive Officer. “Today, effective risk & compliance assessments must analyze data related to administrative, physical, operational and technical controls, relational risks and criticality factors, business impact, and compliance requirements. The 5.0 release of our RSAM™ product further builds on our solid framework and provides the market with what it has been looking for - an easy mechanism to gather and track ad-hoc assessment findings along with survey/template based assessment data.”
Relational Security’s flagship 5th generation product, RSAM™, is built on an open and flexible framework that quickly adapts to any institution’s environment. RSAM™ blends an intuitive multi-user, web-based interface with practical, enhanced risk assessment methodology that can be used to assess risks, controls, and the compliance of technical, physical, and administrative assets, business functions, processes and more. The underlying principle of the RSAM™ technology is to gather intelligent and consistent information to help institutions qualify and quantify risk based on business criticality and compliance requirements. Simple, practical and actionable reports are easy to interpret at the executive, management and technical levels, making it easy to identify gaps & prioritize remediation opportunities.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024