Rsam

Powered by SC Magazine
 

Purpose-built for GRC, smooth integration and mapping/translate features to group data, strong tool for alerting and automation.

Rsam Framework and Rsam Risk & Compliance Management Module is designed to effectively identify, assess, manage and mitigate risks, while providing enterprise-wide visibility, oversight and assurance. Rsam supports deployment in the areas of assessment, audit, compliance, enterprise risk, incident management, issues and remediation tracking, policy management, threat and vulnerability management and vendor
risk management.

The product is offered as both a cloud-based solution and client-side software. For the software option, both a database and web server are required.

The Rsam GRC (governance, risk and compliance) platform combines business criticality, regulatory assessment data and vulnerabilities into a centralized framework to track all risks, controls and remediation activities. This allows administrators to integrate survey-based risk assessments with automated and manual findings-based risk management data to define and implement a successful GRC program.

Some of the standout features included the ability to integrate with a user directory for authenticating and pulling in role data. The dashboard had a business intelligence look and feel. The tool is attractively laid out, and it is simple to group and adjust objects on the fly. The product is workflow driven and has a built-in ticketing system for managing incidents and data collection. We also liked that all data and graphics can be easily outputted for use in other applications. There are numerous templates for reporting, with the ability to create or customize as needed. Another useful feature provides the ability to create any report against any data in the database through a simple interface. The product took that and automatically created the SQL code needed to pull and format that data in Visual Studio.
 

Copyright © SC Magazine, US edition


Rsam
 
Overall Rating
Verdict:
Has all the features to manage risk at all levels of the organisation.
Product Info
Specs:
Version 7.2
 
Supplier:
 
Price when reviewed:
60000
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1013

Vote