We are proud to announce that Risk Fabric®, our cyber risk analytics platform, recently won two prestigious awards.
As part of the 2016 Info Security Global Excellence Awards®, more than 50 judges from a broad spectrum of global industry voices selected Risk Fabric as a Gold Winner in the Security Products and Solutions for Finance and Banking (11 – 99 employees) and Bronze Winner in the Innovation in Enterprise Security (11 – 99 employees) categories.
Info Security Products Guide, the industry’s leading information security research and advisory guide, presents the awards to honor excellence in every facet of the security industry including products, people behind the successes and best companies.
Risk Fabric is currently being leveraged by four out of the top five banking and financial institutions. The platform enables them to run a state-of-the-art cyber security and risk program that allows them to manage and measurably reduce cyber risk.
With the multitude of threats posed at organizations today, CISOs cannot reduce cyber risk alone, especially when certain applications in the business are not under their jurisdiction. Combine that with the current broken process used to analyze cybersecurity data, and it’s a recipe for disaster.
By leveraging Risk Fabric, security practitioners in large Fortune 200 companies can now understand, prioritize and action the volumes of data coming from the current solutions they have deployed.
The platform allows organizations to take an inside-out approach to security by focusing on what’s going on inside of the company, in addition to external threats. It empowers the Security Operations Center to collaborate with line of business owners and further contextualize security data, which leads to prioritized incident response.
Through Risk Fabric, cybersecurity becomes everyone’s business. Key stakeholders in the organization – including Line of Business managers, application owners, C-level executives and board of directors – can all be provided with a tailored view of cyber risk, in addition to guidance from the CISO to take action.