Risk management
Risk management is based on protection requirements. With the potential of the highest quality inventory data to optimize IT infrastructure, technology, quality of service and support processes, you can define requirements precisely tailored to the criticality of resources, in terms of confidentiality, availability and integrity. You can plan the response to breaches based on priority ranking.
Know more
Key benefits
Confidentiality, availability and integrity - define the required level of protection based on key risk areas.
Prioritization of breaches in the context of protection requirements - precisely plan work in accordance with the actual level of threat. Not every breach requires an immediate response - thanks to prioritization, you will always know what is most urgent.
Automatic risk level inheritance - detect threats to key resources from other resources that are dependent. Require protection based on inheritance methods (maximum, dependency, accumulation, distribution).
Main Use cases
Risk management documentation
Get access to information about the current and historical state of the environment configuration and document risk at a point in time thanks to the digital twin environment. Track changes to document risk mitigation by recording actions to eliminate detected threats on critical assets.
Risk level visualization in the IT environment structure
By presenting the structure of the IT environment and inventoried assets as a topology, the elements with the highest risk level are clearly marked on diagrams. Analyze the need to maintain the highest standards for the entire structure that affects such assets thanks to the risk inheritance function.
Detection of violations with every configuration change
All changes are inventoried and verified for compliance with defined policies. Detect violations and analyze them in the context of their severity and risk level.
Protection requirement index - three levels of risk definition
Determine the final level of risk based on three key areas: confidentiality, availability and integrity.