- Corporate Security
- Governance, Risk and Compliance
- Information Security
Resolver’s IT Risk Management Software can manage on the scale of tens of thousands to millions of IT assets including servers, workstations, laptops, network and Internet of Things (IoT) devices with the scalability to update their status in near real-time. Even the largest organizations can have accurate, up to date status of their IT risk.
With Resolver’ IT Risk Management solution, IT team can access all of the data they need from many sources including configuration management databases (CMDB), configuration and patch management tools, data loss prevention systems (DLP), event and incident management systems (SIEMs), ticketing and service manage systems, and vulnerability scanners. This data is critical to provide a contextualized view of risks for the myriad of assets within a typical IT infrastructure.
Managing 10,000 and more assets is impossible to do on an asset-by-asset basis. Risk managers need to automate many tasks, such as importing assets, assigning these assets to the proper owners, updating key asset attributes, retiring assets, creating assessments, propagating asset criticality values and control results, and many other tasks.
Remediate quickly, prioritize and group vulnerabilities based on configurable criteria including criticality, compliance regulations, vendors, SLAs or more. Close the loop by verifying actions and aging. We’ll even rescore the risk for you automatically.
Resolver’s is packaged with JasperReports Server, a leading BI tool, deeply integrated. This deep integration with JasperReports Server ensures that users can create desired reports using all of the data that available in Resolver.
Resolver supports modeling virtually any IT infrastructure. Resolver provides an entity object that can represent a network, an entire system, an application, a server, data, or any other IT, business, or information object.
Resolver supports methodologies including ISO 27001, NIST 800-53, NIST Cybersecurity Framework, PCI DSS 3.2, and COBIT 5.
Manage risks through a closed–loop lifecycle of identification, assessment, remediation, and monitoring.
Track responses and exceptions for IT risk management approvals, reviews, and trends.