TraceSecurity Introduces Industry’s First Cloud Solution Delivering Holistic, Risk-Based Information Security Programs
October 3, 2012Today, organizations struggle with growing risk, complexities, costs and resource demands of deploying and maintaining a complete information security program around risk and vulnerability management, governance and compliance. Current competitive offerings are made up of expensive point solutions with no integration or automated central management, requiring costs and resources that are too much for many organizations outside the F1000 to bear. Now with TraceCSO, organizations have an affordable, scalable solution that is deployed quickly to centralize and tightly integrate key functional areas — including risk management, auditing, governance and compliance reporting; as well as specific areas of policy, process, training, vendor, and vulnerability management — required to build and manage an on-going risk-based information security program, with no third-party software required.
TraceCSO seamlessly guides users through the process of implementing and managing a holistic risk-based information security program that is integrated to identify and dramatically reduces many redundant security controls and security gaps caused by disparate systems, and automates tasks to increase productivity. A centralized solution, TraceCSO simplifies compliance reporting processes and security management of organizations’ data.
Unlike current information security program solutions, which simply provide a console and no remediation tools, TraceCSO identifies and prioritizes risk to an organization’s information — including network vulnerabilities — and identifies, implements and audits security controls. To help organizations stay current with the latest regulatory mandates specific to their industry, TraceCSO leverages a global database of hundreds of authorities and more than 25,000 regulations and citations.
"The TraceCSO system is slick and the setup wizard is very intuitive," said Richard Reinders, Lake Trust Credit Union Information Security analyst. "The assessment structure has so many options, you can take multiple approaches and the system still works. We can foresee TraceCSO increasing visibility into assets on our network through reports that are generated from its vulnerability scan. Also, its process management functionality can help us align controls with institution policies that are documented to meet industry regulations."
TraceCSO’s wizards guide the system set up of adding users and departments, defining permissions and roles, coordinating network scanning, and selecting authority documents. TraceCSO’s Risk Assessment — the cornerstone for setting up and managing the risk-based information security program — identifies asset threats and controls to mitigate risk, and assigns TraceSecurity’s proprietary Risk Score. The Risk Score allows an organization to measure and report on mitigation effectiveness, set benchmarks, and analyze trends — ultimately leading to better risk-based decisions and optimized information security allocations. TraceCSO also identifies existing ineffective or unnecessary controls and recommends the most effective replacements.
Once controls are identified, TraceCSO maps them to a database of more than 25,000 authorities, citations and regulations. This enables the organization to determine industry-specific compliance and allows for a best practice risk-based information security program that organically leads to compliance and eliminates the laborious compliance reporting process. Finally, information determined during the Risk Assessment filters and pre-populates all functional areas of TraceCSO, making the organization’s information risk and compliance profile more visible, more accessible, more manageable and more valuable than ever.
"Current GRC and point products have failed to help companies truly implement a risk-based information security program," said Peter Stewart, TraceSecurity President and CEO. "With TraceCSO, organizations finally have visibility and accountability into their risk and compliance profiles. TraceCSO enables organizations to implement enterprise-level security without enterprise-level overhead or costs. We have relied upon our years of experience of successfully delivering leading vulnerability and risk management solutions, as well as customer feedback, to today deliver the industry’s first and only affordable solution that gives all organizations improved control and the tools required to simply address today’s top risk and compliance concerns. This new product eliminates current barriers of managing an on-going and complete risk-based information security program, including the lack of security expertise, resources and tools."
Pricing and Availability
TraceCSO is sold for an annual subscription rate that scales by employee size, with pricing starting at approximately $5,000, which includes support. It is available later this month from TraceSecurity, with further information available at www.tracecso.com.


