TraceSecurity, a provider of cloud management software, recently introduced TraceCSO, touted as the industry’s first cloud-based solution for a holistic and risk-based information security program.
TraceCSO is a centralized solution that simplifies compliance reporting processes and security management of organizations’ data, according to company officials.
Cloud computing environments need a comprehensive risk management program. With this latest offering in place, companies of any size, industry or security skill set can evaluate, create, implement and manage a comprehensive risk-based information security program. This protects the companies from top information security risks, including cloud security and bring your own device (BYOD) concerns.
In fact, cloud management software has almost eliminated the hurdles once faced by cloud service providers and enterprises. It enables organizations to enter into the cloud hosting market right away and is the key to transitioning an existing infrastructure into what is needed to support next-generation communication capabilities. The risk-based information security program is significant to the success of cloud management software.
TraceCSO acts as a highly scalable solution that can be deployed quickly to centralize and tightly integrate key functional areas including risk management, auditing, governance and compliance reporting; as well as specific areas of policy, process, training, vendor, and vulnerability management. The functional areas are needed to develop and manage an on-going risk-based information security program and no third-party software is required.
Peter Stewart, president and CEO at TraceSecurity, said that with TraceCSO, organizations finally have visibility and accountability into their risk and compliance profiles.
“This new product eliminates current barriers of managing an on-going and complete risk-based information security program, including the lack of security expertise, resources and tools,” Stewart added in a statement.
Additionally, the newest offering identifies existing ineffective or unnecessary controls and recommends the most effective replacements, and then maps them to a database of more than 25,000 authorities, citations and regulations.
Edited by Jamie Epstein