We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNina Tisdell
Modified over 2 years ago
RiskVision 7.0 Unleashing a New Era: Big Data Risk Management Analyst Briefing December 2013
Little Data Compliance Management 2 RiskVision 7.0 | Unleashing a New Era In a dynamically changing risk ecosystem, organizations can no longer rely on Little Data Compliance Management… Data (in MB) Users Organizational Reach 100s 10,000s 1000s 1,000s millions billions Today they need to manage with Big Data Risk Management - and it’s only available with RiskVision 7.0 Big Data Risk Management External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
RiskVision 7.0 | Unleashing Big Data for Risk Mgmt 3 Situational Awareness Risk Posture Visibility High Response Times Time-to-Resolution Reduced Risks Volume Velocity Variety Complexity Resource Restrictions Money Laundering | Counter-Party Risk | Supply Chain Risk | APTs | Data Breaches | IT Risk| Incident Negligence Big Data Risk Management External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
4 RiskVision 7.0 | Big Data for Integrated Risk Mgmt Only with RiskVision 7.0 … Manage enterprise and supplier risk, regulatory compliance, security and incident response in one data-driven system Scale data to peta-bytes combining users, assets, analytics and locations Combine risk intelligence, analytics & remediation in closed-loop, real-time processes Achieve time-to-value in weeks, not years. Avoid continuous consulting for years to come. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
RiskVision 7.0 | Six Big Data Capabilities Unleashed 5 Anywhere, Anytime Analytics Graphical Visualization Cyber Systems Modeling Mobile Data Correlation Operational Risk Workflows Business Process Connectivity External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
6 Cyber Systems Modeling | Accelerate Incident Response Capabilities A RiskVision collection of assets, applications, databases, identities, and locations to correlate data from security tools, generating remediation actions at an aggregate level to prioritize risk mitigation and response. Benefits Delivers savings in the $10ms and identify organizations’ legal readiness for incident response due diligence with auditable, automated response processes. Challenges Disconnected tools for assets, configurations, threats, vulnerabilities and ticketing leave CIOs and CROs with $10ms in inefficient costs, poor attack predictability, and response times that don’t meet regulatory mandates. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
7 Mobile Data Correlation | Cover Cross-Domain Threats Capabilities A new RiskVision service. Mobile entity data attributes to score risk by correlating OS and applications, threat feeds and user identities outside and inside the corporate firewall, before and after devices connect. Benefits Prepares organization to manage the new and defenseless high risk threat vector – rogue applications entering corporate networks via mobile applications. Challenges BYOD is rampant in organizations of all sizes. MDM, Threat Intelligence and IAM systems are separately determining risk and trust levels for mobile devices onboarding. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
8 Anywhere, Anytime Analytics | Speed User Productivity Capabilities HTML 5-based questionnaires, call lists, risk analytics, and ad hoc reports are now available on all handheld notebook and smartphone devices – anywhere, anytime Benefits Enables organizations to immediately analyze large risk data sets and operationalize risk- based decision process automation to users outside of compliance, security and IT. Challenges Non-technical and business unit users need support for widespread use of reporting analytics and actions on mobile devices. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
9 Business Process Connectivity | Tie Risk to the Business Capabilities A new RiskVision object framework. Data records ranging from 10ks to 1ms, pulled from or pushed to ERP, financial, HR, credit rating, payment, supply chain, or any other custom or third party business application. Benefits Links operational risks to the business, in use cases for supply chain, counter-party and business resilience risk, easing multi-national regulatory concerns on governance process. Challenges Assessment-only models don’t provide real- time data for owners to see risk baselines or changes to: user identities, organization or legal entity structures, enterprise financials, and supplier services, ratings and spending. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
10 Operational Risk Workflows | Scale Operational Efficiency Capabilities A new RiskVision framework. Dynamic data workflows streamlining Ops Risk audits by delivering actions to the right domains at the right time. Model is extensible to all ORM needs: e.g. AML, Basel II, FCPA, etc. Benefits Operationally-efficient resource usage limits audit findings, covers all regulatory reviews without adding to staff, and gives current staff time for risk analytics and audit management. Challenges Regulations require auditable workflows for all ops risk processes. Manual-driven review branching to specific domain owners is slow and misses many mushrooming supplier and customer reviews, leading to audit failures. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
11 Graphical Visualization | Automate Process Change Capabilities Auto-diagramming complex workflows in easy to see and interactive views. Extensible to graphical visualizations of organizational hierarchy and enterprise architectures with embedded risk data relationships. Benefits Enables business user acceptance of more sophisticated systems of workflows, assets classification, inheritance, and propagation. Challenges Practitioners can be challenged to visualize large data sets, complex workflows, and mitigation actions. Some workflows require over 50 steps and are hard to see without a easy-to-view, automated graphic. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
12 RiskVision 7.0 | A Revolution Against The Status Quo RiskVision by Agiliance Big Data Risk Mgmt First Generation Tools Little Data Comp. Mgmt Practitioner Reach20,000+100s Assets Managed1,000,000+10,000s Data ManagedGiga-to-Peta bytesMega-to-Giga bytes Analytical FoundationEmployee AccountabilityManagerial Opinion Analytical Methodology Data-Driven & Assessment-Driven MaintainabilitySelf-SufficiencyContinuous Consulting PricingValue-BasedProject-Based Total Cost of Ownership Transparent 1/3 of competing solutions Opaque Solution Provider Value Transformational $ millions Tactical $ millions External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
13 RiskVision 7.0 | Product Demo External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
14 RiskVision 7.0 | Pricing and Availability Starts at $25,000 per application per year Grows with number of: Applications used Connectors used Assets managed Agiliance RiskVision 7.0 will be available to customers and partners on December 17, 2013 External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
Questions and Answers 15 Agiliance Inc. 840 West California Ave Suite 240 Sunnyvale, CA 94086 +1 408.200.0400 firstname.lastname@example.org External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
GRC: Aligning Policy, Risk and Compliance Raquel Miller – RSA Archer Specialist Matt Crawley – RSA Archer Engineer Jesse Read & Steve Armendariz – RSA.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Copyright © 2012 Accenture & Symantec. All rights reserved. This Sales Accelerator presentation is intended to provide sales teams fast facts on solutions.
1 Strategic Meetings Management 101 Lynda Garvey. SMMC Strategic Meetings Consultant.
Dell Connected Security Solutions Simplify & unify.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
2015 NetSymm Overview NETSYMM OVERVIEW December
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
© 2013 Amadeus IT Group SA 265ced1609a17cf1a a2ad ae8 Amadeus Travel Intelligence ‘Monetising’ big data sets Pascal Clement, Head of Travel.
© 2013 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Achievement of an Integrated Applications Environment Enterprise.
1 1 © 2007 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Under NDA Quality Monitoring for Communication Manager.
1 BFSI Solutions. 2 Compliance and Regulatory Solutions Customer Retention Toolkit - Transition from Product Centricity to Customer Centricity Operational.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
The State of Security Management By Jim Reavis January 2003.
2007 APTEC, LLC Confidential Unleashing Directory-Powered Business SM Campus Security and Identity Management in a Banner World Aaron Perry November 23,
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Proprietary and Confidential Secure Mobile Productivity & Collaboration for the Enterprise Secure mobile productivity Access, sync and edit files.
+ Secure C2 Systems Ali Alhamdan, PhD National Information Center Ministry of Interior April 28 th, 2015.
December 2010 Partner Support Service Overview. © 2010 Cisco Systems, Inc. All rights reserved. 2 Agenda Collaborative Services, Customer Response Collaborative.
Network security Product Group 2 McAfee Network Security Platform.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
©2014 Bit9. All Rights Reserved. Prevent Detect & Respond Prevention Visibility Detection Response Security Life Cycle for Advanced Threats EPP ETDR.
Enabling traceability and transparency with standards-based regulatory reporting Dr. Said Tabet Senior Technologist and Industry Standards Strategist Office.
Business Breakthroughs Robert Osborne Business Breakthroughs Inc.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP TRIM HP Information Management.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Insert Your Name Insert Your Title Insert Date Building a Fully Trusted Authentication Environment IBM-SafeNet Joint Solutions Strong Authentication for.
Copyright © 2006 Credit & Management Systems, Inc. All rights reserved. All other product names are trademarks of their respective owners. COMMERCIAL CREDIT.
1 Michael Siegel James Houghton Advancing Cybersecurity Using System Dynamics Simulation Modeling For System Resilience, Patching, and Software Development.
Aravo Assure November 16, 2011 © 2011 Aravo Solutions. Confidential and proprietary information. Robert Shecterle VP - Marketing +1 (415)
© 2017 SlidePlayer.com Inc. All rights reserved.