I-Secure Product Overview © 2010 ECC International. All Rights Reserved www.eccIgroup.com 1 ECC International PHILIPPINES :: MALAYSIA :: VIETNAM © 2010.

Slides:



Advertisements
Similar presentations
From the eyes of an Administrator A general overview of e-CFunds Administrative Site, including navigation and exploring the features of this powerful.
Advertisements

Web Center Certification Administration Web Center Certification Training Intuit Financial Services University.
EzScoreboard.com A Fully Integrated Administration Service.
Writing Good Use Cases - Instructor Notes
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Project Management with VIVA PPM Tool (Project Portfolio Management)
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1 IT Risk Management in Government Jonathan Smith Sr. Risk Manager Commonwealth Security and Risk Management October 1,
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
SysAid IT 8.5.
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Airmux Presentation for TS2012 Slide 1 Presented by: CBNetworks Technical Support Airmux- Planner.
1 Program Management Practice Program Management Portal: Contract Management and the Client © 2011, 2013 IBM Corporation.
1 Division of Aging and Adult Services (DAAS) Knowledge Management and Transfer Project 7/30/12.
May 2009 Oracle GRC Strategy – Barry Greenhut
The importance of the service catalogue to the service desk
PAYSOFT A Payroll Mgt. Software. Key Features Handles Payroll operations of Any Organization Records Employees Comprehensive Data Flexibility in Processing.
“The Honeywell Web-based Corrective Action Solution”
Traffic Analyst Complete Network Visibility. © 2013 Impact Technologies Inc., All Rights ReservedSlide 2 Capacity Calibration Definitive Requirements.
KronoDesk® - Product Information
Airport Sustainability is a holistic approach to managing an airport to ensure Economic viability, Operational efficiency, Natural resource conservation,
COMOS Mobile Solutions 1.0 Simplified global collaboration
Developing a Risk-Based Information Security Program
Presentation by Priyanka Sawarkar
©2007 First Wave Consulting, LLC Tutorials-Documentation-Help Wingman™ Knowledge Capture.
Risk The chance of something happening that will have an impact on objectives. A risk is often specified in terms of an event or circumstance and the consequences.
Subtitle Version or Date Presentation Title BCeSIS Overview Module 1.
NIMS Resource Management IS-703.A – August 2010 Visual 2.1 Unit 2: Resource Management Overview.
Inter-Agency Child Protection
– SIS SWISS INTERNATIONAL AIR LINES ICH USER GROUP MEETING KUALA LUMPUR OCTOBER 2010.
IT Analytics for Symantec Endpoint Protection
What is this course? This course is designed to provide a basic awareness and understanding of ICD-10 and why it is so critical to our organization.
Open Range Software Welcome to a presentation of the Open Range Industrial Hygiene Program.
Massachusetts Digital Government Summit October 19, 2009 IT Management Frameworks An Overview of ISO 27001:2005.
Information Technology – Guidelines for the Management of IT Security
Confidential & Proprietary to Cooper Compliance Corporation Revised September 8, 2014 AUDiT-READY TM.
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2008 Certified Company This document is the property of and proprietary to.
Key Considerations for Report Generation & Customization Richard Wzorek Director, Production IT Confidential © Almac Group 2012.
Optimos Solutions – Working For You Presented to JMATE 2006.
ITIL: Service Transition
“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Introducing The definitive,
Security Controls – What Works
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
First Practice - Information Security Management System Implementation and ISO Certification.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
SecureAware Building an Information Security Management System.
November 17, Critical Risk Identification System (CRIS) United States Department of Agriculture Office of Homeland Security & Emergency Coordination.
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Thank You ©2012, Cognizant. Rapido has been created by the Research and Development team from QE&A Technology CoE Rapido is continuously enhanced and.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 11 Project Risk Management.
Copyright © 2015 Risk Decisions. All rights reserved | Project Risk Management – confidence to deliver: on budget, on time, every.
© 2003, 2012, Advanced Fitness Designs, Inc. All rights reserved. Reproduction of in any form, printed or electronic is expressly forbidden. AthleteMonitoring.com.
SacProNet An Overview of Project Management Techniques.
LUCIDITY SOFTWARE GREATER CLARITY MAKES ORGANISATIONS MORE INTELLIGENT.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Assessment Findings Validation Title of the Project (date)
Advanced Metrics for ITSM Overview. Proprietary and Confidential Packaged Metrics ITIL-Friendly application Simple for Anyone Quick Implementation.
A PCA Smart Client Application Safety Issue Tracker.
GRC: Aligning Policy, Risk and Compliance
Learn Integrated Management System Documentation Process with Ready-to-use EQHSMS Documentation Kit
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Primary Steps for Achieving ISO Certification.
Compliance Management System. Intelex System Overview Focus Modules: –Permits Management –Monitoring & Measurement –Training Management –Document Control.
MAJOR MODULES Recruitment Management Attendance Management
ITIL: Service Transition
An Introduction to Attendance on Demand
TechStambha PMP Certification Training
Presentation transcript:

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 1 ECC International PHILIPPINES :: MALAYSIA :: VIETNAM © 2010 ECC International. Information Security Management Made Easy i-SeQure PRODUCT OVERVIEW

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 2 Agenda Product Introduction Product Benefits Product Highlights Functional Architecture Functions Overview: Asset Management Risk Management Incident Management Measurement Management Awareness Management Product/Service Packages

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 3 Introduction Comprehensive Information Security Risk Management Tool based on ISO risk management process. Six User Friendly Modules for identification, management and reporting of information assets and associated risks, security incidents, security measurements and security awareness trainings.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 4 Introduction Unique Modules such as Information Security: Measurement, Awareness and Incident Management Easily Configurable to suit any kind of organization with different organizational structures and departments. The tool is multi-user and multi-location accessible through a simple browser.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 5 Benefits Quick start to ISO based information security management system implementation and certification. Information security risk management process made simpler, efficient and effective. Enhances communication and coordination amongst the information security management team through a single dashboard. Compliance with ISO based risk management framework and ISO recommended guidelines. Ensure consistent and repeatable approach to information security risk management. Flexible and configurable to suit any kind of organization.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 6 Highlights Identify, classify and characterize information assets Pre-defined list of threats and associated vulnerabilities Automatic generation of Statement of Applicability Security measurement made easy through 11 measurement categories and 30 metrics Indentify and analyze 7 categories of information security incidents. Reporting made easy through filter based report generation in multiple formats. Upload security awareness materials and management awareness programs. Security risks and incident dashboards

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 7 Functional Architecture ASSET MANAGEMENTRISK MANAGEMENT INCIDENT MANAGEMENTMEASUREMENTS AWARENESS MANAGEMENTDASHBOARD WORKFLOW SETTINGS REPORTS PDF, DOC,EXCEL

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 8 Functions Overview: Asset Management 1.Identify and Characterize the Asset 2.Classify the Asset based on Confidentiality 3.Categorize the Asset based on 7 types. 4.Rate the information assets based on confidentially, integrity and availability. 5.Associate an asset with a department, asset owner and location.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved Identify threats and vulnerability. 2.Asses the probability and impact of the risk. 3.Evaluate and classify the risks. 4.Select the risk treatment options. 5.Develop the risk treatment plan. 6.Generate the State of Applicability Functions Overview: Risk Management

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 10 Functions Overview: Incident Management 1.Capture information security incident details. 2.Classify the incident into 7 types. 3.Record necessary action items 4.Manage the incident to closure. 5.Associate incidents to assets.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved Select the measurement from 11 categories and 20 pre-defined metrics 2.Set measurement objectives. 3.Collect the measurement data. 4.Perform trend analysis Functions Overview: Measurement Management

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 12 Functions Overview: Awareness Management 1.Plan and schedule security awareness, training and education programs. 2.Register participants and manage attendance. 3.Associate training titles with standards set of training materials. 4.Upload training materials.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 13 Functions Overview: Reports 1.Instant report generation at a click. 2.Use filter to decide the required information in each report. 3.Export reports to different formats such as Word, PDF and Excel. 4.Generate 10 different types of reports.

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 14 Product Packages Servicesi-Secure Standard i-Secure Silver i-Secure Gold Installation SupportXOffsiteOnsite* Set-Up and ConfigurationXOffsiteOnsite* User TrainingE-learning (Self)OffsiteOnsite* Data UploadX Maintenance SupportOne MonthSix MonthsOne Year Information Security Awareness Training Materials X

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 15 Thank you !