February 2019

February 25, 2019

1 minute Read

Cyber Risk Management

The most difficult part of risk management is identifying information assets and assigning monetary values to specific assets. The Ignyte Cyber Risk Management...

February 25, 2019

1 minute Read

Threat & Vulnerability

Consume and consolidate threat data from various threat intelligence sources to provide a more comprehensive view of the cyber threat landscape. The Ignyte...

February 25, 2019

1 minute Read

Robust Audit Management Software

...

December 2018

December 12, 2018

0 minutes Read

Connectors

...

December 12, 2018

1 minute Read

Vendor Risk Management

Import shared assessment SIGs to quickly develop customized questionnaires. Self-onboarding reduces the administrative burden and automated scoring features...

December 12, 2018

1 minute Read

Policy Management

The Ignyte Policy Module provides a perfect foundation for policy development. Policy authoring, approval, and publication workflows coupled with ready-to-use...

December 12, 2018

1 minute Read

Operational Risk Management

Reduce manual cyber risk entry through tight integration with other Ignyte Assurance Platform™ modules, such as the Business Continuity Management or...

December 12, 2018

1 minute Read

Business Continuity Management

Complete a business impact analysis through point and click business process mapping or using data from another module. Assign criticality and dependencies for...

December 12, 2018

1 minute Read

Predictive Threat Modeling

The Ignyte Predictive Threat Modeling module analyzes and constructs an accurate logical, physical, and conceptual models of systems, networks, organization,...

December 12, 2018

1 minute Read

Quantify Asset Values

The most difficult part of risk management is identifying information assets and assigning monetary values to specific assets. The Ignyte Cyber Risk Management...

December 12, 2018

1 minute Read

Consolidate Threat Data

Consume and consolidate threat data from various threat intelligence sources to provide a more comprehensive view of the cyber threat landscape. The Ignyte...

December 12, 2018

1 minute Read

Robust Audit Management Software

IT audit is inherently process-intensive with many audit teams using spreadsheets to schedule and manage audits. Eliminate the need for spreadsheets and manual...

December 12, 2018

1 minute Read

Compliance Management & Oversight

Map your organizational controls once and assess compliance with regulations as they are released. The Ignyte Compliance Management and Oversight module has...