We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNina Tisdell
Modified over 2 years ago
RiskVision 7.0 Unleashing a New Era: Big Data Risk Management Analyst Briefing December 2013
Little Data Compliance Management 2 RiskVision 7.0 | Unleashing a New Era In a dynamically changing risk ecosystem, organizations can no longer rely on Little Data Compliance Management… Data (in MB) Users Organizational Reach 100s 10,000s 1000s 1,000s millions billions Today they need to manage with Big Data Risk Management - and it’s only available with RiskVision 7.0 Big Data Risk Management External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
RiskVision 7.0 | Unleashing Big Data for Risk Mgmt 3 Situational Awareness Risk Posture Visibility High Response Times Time-to-Resolution Reduced Risks Volume Velocity Variety Complexity Resource Restrictions Money Laundering | Counter-Party Risk | Supply Chain Risk | APTs | Data Breaches | IT Risk| Incident Negligence Big Data Risk Management External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
4 RiskVision 7.0 | Big Data for Integrated Risk Mgmt Only with RiskVision 7.0 … Manage enterprise and supplier risk, regulatory compliance, security and incident response in one data-driven system Scale data to peta-bytes combining users, assets, analytics and locations Combine risk intelligence, analytics & remediation in closed-loop, real-time processes Achieve time-to-value in weeks, not years. Avoid continuous consulting for years to come. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
RiskVision 7.0 | Six Big Data Capabilities Unleashed 5 Anywhere, Anytime Analytics Graphical Visualization Cyber Systems Modeling Mobile Data Correlation Operational Risk Workflows Business Process Connectivity External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
6 Cyber Systems Modeling | Accelerate Incident Response Capabilities A RiskVision collection of assets, applications, databases, identities, and locations to correlate data from security tools, generating remediation actions at an aggregate level to prioritize risk mitigation and response. Benefits Delivers savings in the $10ms and identify organizations’ legal readiness for incident response due diligence with auditable, automated response processes. Challenges Disconnected tools for assets, configurations, threats, vulnerabilities and ticketing leave CIOs and CROs with $10ms in inefficient costs, poor attack predictability, and response times that don’t meet regulatory mandates. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
7 Mobile Data Correlation | Cover Cross-Domain Threats Capabilities A new RiskVision service. Mobile entity data attributes to score risk by correlating OS and applications, threat feeds and user identities outside and inside the corporate firewall, before and after devices connect. Benefits Prepares organization to manage the new and defenseless high risk threat vector – rogue applications entering corporate networks via mobile applications. Challenges BYOD is rampant in organizations of all sizes. MDM, Threat Intelligence and IAM systems are separately determining risk and trust levels for mobile devices onboarding. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
8 Anywhere, Anytime Analytics | Speed User Productivity Capabilities HTML 5-based questionnaires, call lists, risk analytics, and ad hoc reports are now available on all handheld notebook and smartphone devices – anywhere, anytime Benefits Enables organizations to immediately analyze large risk data sets and operationalize risk- based decision process automation to users outside of compliance, security and IT. Challenges Non-technical and business unit users need support for widespread use of reporting analytics and actions on mobile devices. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
9 Business Process Connectivity | Tie Risk to the Business Capabilities A new RiskVision object framework. Data records ranging from 10ks to 1ms, pulled from or pushed to ERP, financial, HR, credit rating, payment, supply chain, or any other custom or third party business application. Benefits Links operational risks to the business, in use cases for supply chain, counter-party and business resilience risk, easing multi-national regulatory concerns on governance process. Challenges Assessment-only models don’t provide real- time data for owners to see risk baselines or changes to: user identities, organization or legal entity structures, enterprise financials, and supplier services, ratings and spending. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
10 Operational Risk Workflows | Scale Operational Efficiency Capabilities A new RiskVision framework. Dynamic data workflows streamlining Ops Risk audits by delivering actions to the right domains at the right time. Model is extensible to all ORM needs: e.g. AML, Basel II, FCPA, etc. Benefits Operationally-efficient resource usage limits audit findings, covers all regulatory reviews without adding to staff, and gives current staff time for risk analytics and audit management. Challenges Regulations require auditable workflows for all ops risk processes. Manual-driven review branching to specific domain owners is slow and misses many mushrooming supplier and customer reviews, leading to audit failures. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
11 Graphical Visualization | Automate Process Change Capabilities Auto-diagramming complex workflows in easy to see and interactive views. Extensible to graphical visualizations of organizational hierarchy and enterprise architectures with embedded risk data relationships. Benefits Enables business user acceptance of more sophisticated systems of workflows, assets classification, inheritance, and propagation. Challenges Practitioners can be challenged to visualize large data sets, complex workflows, and mitigation actions. Some workflows require over 50 steps and are hard to see without a easy-to-view, automated graphic. External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
12 RiskVision 7.0 | A Revolution Against The Status Quo RiskVision by Agiliance Big Data Risk Mgmt First Generation Tools Little Data Comp. Mgmt Practitioner Reach20, s Assets Managed1,000,000+10,000s Data ManagedGiga-to-Peta bytesMega-to-Giga bytes Analytical FoundationEmployee AccountabilityManagerial Opinion Analytical Methodology Data-Driven & Assessment-Driven MaintainabilitySelf-SufficiencyContinuous Consulting PricingValue-BasedProject-Based Total Cost of Ownership Transparent 1/3 of competing solutions Opaque Solution Provider Value Transformational $ millions Tactical $ millions External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
13 RiskVision 7.0 | Product Demo External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
14 RiskVision 7.0 | Pricing and Availability Starts at $25,000 per application per year Grows with number of: Applications used Connectors used Assets managed Agiliance RiskVision 7.0 will be available to customers and partners on December 17, 2013 External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
Questions and Answers 15 Agiliance Inc. 840 West California Ave Suite 240 Sunnyvale, CA External Use © 2014 Agiliance Inc. Confidential. All rights reserved.
Compliance Technology Solutions NASACT Presentation Material Robert Garagiola – AERS National Technology Practice January 31 st, 2007.
MDM Strategies for the Global 10,000 Atul Patel Director MDM SAP Asia Pacific & Japan
Adding Value to Your e-business with IBM Tivoli Performance & Availability Solutions Manage Your Technology Master Your Business Customer Name Speaker.
1 27-Dec-13 © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved Intellinx Ltd. Intellinx The Enterprise Fraud and Monitoring Solution.
Soluzioni IBM per il Product Information Management Nicola Nodari Information Management Solutions Business Development Segrate, 25 novembre 2009.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice The Business Case for Configuration.
2007 APTEC, LLC Confidential Unleashing Directory-Powered Business SM Campus Security and Identity Management in a Banner World Aaron Perry November 23,
A Federated Approach to Big Data -- IBM Watson Explorer Presented by: Ken Holmes.
Intelligent Risk Management & Compliance Cost Reduction Creating a sustainable risk and compliance organization while reducing inefficiency and improving.
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Presented to: By: Date: Federal Aviation Administration System Wide Information Management (SWIM) Operational Responsiveness: An Emerging Trend - Intelligent.
CUSTOMER SERVICE Overview Ralph R. Zerbonia President Universe Central Corporation.
Managing IT Budgets in Uncertain Economic Times: IT Optimization.
Nicki Sommer Principal Sales Consultant NCOAUG, August 15, 2008 Whats new in release 12 manufacturing?
DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
Introducing Oracle Insurance Chuck Johnston Vice President Strategy and Alliances Insurance Global Business Unit.
©Company confidential 1 BI in FMCG Industry - Raj Basu.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1 CON2161 Big Data in Financial Services: Technologies, Use Cases and Implications.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP BSM for Wholesale Payments An.
NASACT Grants Management: Are States Ready to Manage More Federal Grant Funds? March 2, 2010.
© 2016 SlidePlayer.com Inc. All rights reserved.