SlideShare a Scribd company logo
1 of 3
Download to read offline
eGestalt Announces Next Generation Security Posture Management with Aegify

Cloud-based, Software-only solution is powered by Rapid7 technology

SANTA CLARA, Calif., November 19, 2012– eGestalt Technologies (www.eGestalt.com), a provider of IT security
monitoring and compliance management for SMBs and enterprises, today announced Aegify, the world's first
completely integrated and unified IT-GRC and cloud-based Security Posture Management (SPM) product using a
completely software-based solution.

Security Posture Management (SPM) is the art and science of monitoring and managing business security status
by orchestrating process, people, and technological resources to achieve security objectives. This involves
identifying business critical IT assets, evaluating their risks based on vulnerabilities and the impact of potential
threats, and mapping results directly to controls to initiate appropriate countermeasures.

Aegify SPM is powered by Rapid7's Nexpose vulnerability management technology, which scans physical and
virtual networks, databases, operating systems and web applications, enabling customers to remediate
vulnerabilities and misconfigurations and to enforce policies. Rapid7 (www.rapid7.com) is a leading provider of IT
security risk management solutions used by more than 2,000 enterprises and government agencies in more than
65 countries.

Aegify is a complete integration of eGestalt's HIPAA and PCI compliance tool SecureGRC, with security posture
management capability using an innovative, patent-pending expert systems technology to automatically map the
security vulnerabilities to compliance mandates. The tool can import data from other standard vulnerability
scanners in the industry as well.

Says eGestalt President Anupam Sahai, "We are very excited about the strategic partnership with Rapid7. Aegify is
the first true software- and cloud-based unified security and IT-GRC solution on the market with end-to-end
automation including vendor management and support for multiple compliance business frameworks such as PCI,
HIPAA/HITECH, SOX, FISMA, and GLBA. This is also the first product in the market which can automatically map
security vulnerabilities to compliance mandates using an innovative expert systems approach thereby eliminating
manual work required and saving significant costs. It advances the state of the art in the industry besides still
continuing to be 10 to 20 times more cost-effective than any other competing solution."

There are thousands of security exposures identified and documented as vulnerabilities. Tools used by cyber-
attackers are very sophisticated and attackers can breach the perimeter and steal data within seconds and
minutes. Businesses are often caught unaware, discovering the breach only weeks and sometimes months
afterwards.

"Aegify SPM brings a new cloud-based approach to managing security posture that is innovative, easy to use, and
extremely valuable for defenders," said Sheldon Malm, Senior Director of Strategic Partners and Alliances at
Rapid7. "By leveraging Rapid7 technology, Aegify SPM provides a comprehensive view of exposure risk that is
directly connected to business assets and compliance management. This is a complementary offering that will
benefit our joint customers."

A cloud application, Aegify's SPM "all hands on deck" threat management approach performs asset discovery,
vulnerability analysis, risk profiling, threat impact analysis and compliance mapping. It can identify 92,000
vulnerability checks for more than 31,800 vulnerabilities across physical and virtual networks, operating systems,
databases, and Web applications.

The cloud-based Aegify engine is driven in large part by eGestalt's flagship product Aegify SecureGRC, a unified
security and compliance management tool that includes all of the necessary security and IT-GRC functionality
required to gain control and improve compliance levels across more than 400+ regulations.

While the framework allows for the easy plug-in of any regulation or standard, eGestalt currently offers to the
channel ready-to-roll compliance services with built-in frameworks to support the most stringent and popular
regulations including PCI, HIPAA/HITECH, SOX, FISMA, and GLBA, as well as more country-specific regulations.
Extensible with built-in frameworks, the Aegify SecureGRC solution offers a simplified approach for PCI,
HIPAA/HITECH and other country specific frameworks ready-to-use out of the box. It provides automated mapping
of a network's security posture to compliance controls.

All told, the integrated Security Posture Management solution Aegify offers a single approach to security and
compliance management, and because it is delivered as SaaS, it is available at low cost due to its pay -as-you-grow
model.

A Community Edition for diagnostics is available as a free download at http://www.egestalt.com/. For further
details please call (408) 689-2586 or email sales@egestalt.com .

About Rapid7 Nexpose

Nexpose proactively supports the entire vulnerability management lifecycle, including discovery, detection,
verification, risk classification, impact analysis, reporting and mitigation. This gives organizations immediate insight
into the security posture of their IT environment by conducting over 92,000 vulnerability checks for more than
31,800 vulnerabilities. The solution leverages one of the largest vulnerabilities databases to identify vulnerabilities
across networks, operating systems, databases, Web applications and virtual assets. Risk is classified based on real
exploit intelligence combined with industry standard metrics such as CVSS, as well as temporal and weighted risk
scoring. Nexpose provides a detailed, sequenced remediation roadmap with time estimates for each task. Nexpose
is used to help organizations improve their overall risk posture and security readiness as well as to comply with
mandatory regulations, including security requirements for PCI, HIPAA, ARRA HITECH ACT, FISMA (including SCAP,
USGCB, FDCC and CyberScope Compliance), Sarbanes-Oxley (SOX) and NERC CIP. Nexpose is a Common Criteria
EAL3+ product and received the SC Magazine Vulnerability Assessment Tool of the Year Award in 2012.
About eGestalt Technologies Inc.

eGestalt (www.egestalt.com) is a world-class, innovation driven, leading provider of cloud-computing based
enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara,
CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt SecureGRC was given a rating of 4.5 stars (out
of a maximum 5) with 5 stars for Features, Support and Value for money by SC magazine in June 2012. In Feb. 2012
eGestalt President Anupam Sahai was named a Channel Chief by Everything Channel's CRN. eGestalt has been
ranked in the Top 10 Vendors for Compliance Management and Data Access & Security by Hypatia Research, Q4
2011. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by
SiliconIndia among the "Top 10 Security Companies to Watch." Its SecureGRC application was voted runner-up in
the Managed Services Category at XChange Tech Innovators, Nov. 2010. In Sept. 2011 it was selected by Everything
Channel as a 2011 CRN Emerging Technology Vendor as well as a 2011 Tech Innovator for Managed Services.

Press Contact:

Victor Cruz
Principal, MediaPR.net
For eGestalt Technologies
vcruz@mediapr.net

More Related Content

What's hot

Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Bill Ross
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009mattdriscoll
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...Rea & Associates
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceSasha Nunke
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009mattdriscoll
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 

What's hot (20)

Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Fix nix Pitch
Fix nix PitchFix nix Pitch
Fix nix Pitch
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT Governance
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 

Viewers also liked

Charles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationCharles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationJess Farr
 
Ncvo october 7 mind presentation
Ncvo october 7 mind presentationNcvo october 7 mind presentation
Ncvo october 7 mind presentationJess Farr
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 
Presentación 4to i sdmj
Presentación 4to i sdmjPresentación 4to i sdmj
Presentación 4to i sdmjMaría José
 
Ncvo 7th October Disability LIB
Ncvo 7th October Disability LIB Ncvo 7th October Disability LIB
Ncvo 7th October Disability LIB Jess Farr
 
Oct 7 foresight presentation
Oct 7 foresight presentationOct 7 foresight presentation
Oct 7 foresight presentationJess Farr
 
Tesy Britton Future of Membership Presentation
Tesy Britton Future of Membership PresentationTesy Britton Future of Membership Presentation
Tesy Britton Future of Membership PresentationJess Farr
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
Introduction to Pinterest
Introduction to PinterestIntroduction to Pinterest
Introduction to PinterestSomdeep Sen
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
Yashar zargari
Yashar zargariYashar zargari
Yashar zargarisimorgh
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHAegify Inc.
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness DecoderAegify Inc.
 
Ncvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationNcvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationJess Farr
 

Viewers also liked (16)

Charles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership PresentationCharles Armstrong Future of Membership Presentation
Charles Armstrong Future of Membership Presentation
 
Ncvo october 7 mind presentation
Ncvo october 7 mind presentationNcvo october 7 mind presentation
Ncvo october 7 mind presentation
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
Presentación 4to i sdmj
Presentación 4to i sdmjPresentación 4to i sdmj
Presentación 4to i sdmj
 
Ncvo 7th October Disability LIB
Ncvo 7th October Disability LIB Ncvo 7th October Disability LIB
Ncvo 7th October Disability LIB
 
Oct 7 foresight presentation
Oct 7 foresight presentationOct 7 foresight presentation
Oct 7 foresight presentation
 
Tesy Britton Future of Membership Presentation
Tesy Britton Future of Membership PresentationTesy Britton Future of Membership Presentation
Tesy Britton Future of Membership Presentation
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Introduction to Pinterest
Introduction to PinterestIntroduction to Pinterest
Introduction to Pinterest
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Yashar zargari
Yashar zargariYashar zargari
Yashar zargari
 
Issue based organizing
Issue based organizingIssue based organizing
Issue based organizing
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
Ncvo october 7 yrhf presentation
Ncvo october 7 yrhf presentationNcvo october 7 yrhf presentation
Ncvo october 7 yrhf presentation
 
Issue based organizing
Issue based organizingIssue based organizing
Issue based organizing
 

Similar to eGestalt Announces Next Generation Security Posture Management with Aegify

G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event ManagementSatya Harish
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...flashnewsrelease
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities Bhupesh Chaurasia
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the CloudSteven_Jackson
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidentsbelsis
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?Adlan Hussain
 

Similar to eGestalt Announces Next Generation Security Posture Management with Aegify (20)

G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
Redington Value Journal - September 2016
Redington Value Journal - September 2016Redington Value Journal - September 2016
Redington Value Journal - September 2016
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the Cloud
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
 

More from Aegify Inc.

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityAegify Inc.
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedAegify Inc.
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security SolutionsAegify Inc.
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryAegify Inc.
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaasAegify Inc.
 

More from Aegify Inc. (9)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support Cybersecurity
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus Demystified
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 

eGestalt Announces Next Generation Security Posture Management with Aegify

  • 1. eGestalt Announces Next Generation Security Posture Management with Aegify Cloud-based, Software-only solution is powered by Rapid7 technology SANTA CLARA, Calif., November 19, 2012– eGestalt Technologies (www.eGestalt.com), a provider of IT security monitoring and compliance management for SMBs and enterprises, today announced Aegify, the world's first completely integrated and unified IT-GRC and cloud-based Security Posture Management (SPM) product using a completely software-based solution. Security Posture Management (SPM) is the art and science of monitoring and managing business security status by orchestrating process, people, and technological resources to achieve security objectives. This involves identifying business critical IT assets, evaluating their risks based on vulnerabilities and the impact of potential threats, and mapping results directly to controls to initiate appropriate countermeasures. Aegify SPM is powered by Rapid7's Nexpose vulnerability management technology, which scans physical and virtual networks, databases, operating systems and web applications, enabling customers to remediate vulnerabilities and misconfigurations and to enforce policies. Rapid7 (www.rapid7.com) is a leading provider of IT security risk management solutions used by more than 2,000 enterprises and government agencies in more than 65 countries. Aegify is a complete integration of eGestalt's HIPAA and PCI compliance tool SecureGRC, with security posture management capability using an innovative, patent-pending expert systems technology to automatically map the security vulnerabilities to compliance mandates. The tool can import data from other standard vulnerability scanners in the industry as well. Says eGestalt President Anupam Sahai, "We are very excited about the strategic partnership with Rapid7. Aegify is the first true software- and cloud-based unified security and IT-GRC solution on the market with end-to-end automation including vendor management and support for multiple compliance business frameworks such as PCI, HIPAA/HITECH, SOX, FISMA, and GLBA. This is also the first product in the market which can automatically map security vulnerabilities to compliance mandates using an innovative expert systems approach thereby eliminating manual work required and saving significant costs. It advances the state of the art in the industry besides still continuing to be 10 to 20 times more cost-effective than any other competing solution." There are thousands of security exposures identified and documented as vulnerabilities. Tools used by cyber- attackers are very sophisticated and attackers can breach the perimeter and steal data within seconds and minutes. Businesses are often caught unaware, discovering the breach only weeks and sometimes months afterwards. "Aegify SPM brings a new cloud-based approach to managing security posture that is innovative, easy to use, and extremely valuable for defenders," said Sheldon Malm, Senior Director of Strategic Partners and Alliances at
  • 2. Rapid7. "By leveraging Rapid7 technology, Aegify SPM provides a comprehensive view of exposure risk that is directly connected to business assets and compliance management. This is a complementary offering that will benefit our joint customers." A cloud application, Aegify's SPM "all hands on deck" threat management approach performs asset discovery, vulnerability analysis, risk profiling, threat impact analysis and compliance mapping. It can identify 92,000 vulnerability checks for more than 31,800 vulnerabilities across physical and virtual networks, operating systems, databases, and Web applications. The cloud-based Aegify engine is driven in large part by eGestalt's flagship product Aegify SecureGRC, a unified security and compliance management tool that includes all of the necessary security and IT-GRC functionality required to gain control and improve compliance levels across more than 400+ regulations. While the framework allows for the easy plug-in of any regulation or standard, eGestalt currently offers to the channel ready-to-roll compliance services with built-in frameworks to support the most stringent and popular regulations including PCI, HIPAA/HITECH, SOX, FISMA, and GLBA, as well as more country-specific regulations. Extensible with built-in frameworks, the Aegify SecureGRC solution offers a simplified approach for PCI, HIPAA/HITECH and other country specific frameworks ready-to-use out of the box. It provides automated mapping of a network's security posture to compliance controls. All told, the integrated Security Posture Management solution Aegify offers a single approach to security and compliance management, and because it is delivered as SaaS, it is available at low cost due to its pay -as-you-grow model. A Community Edition for diagnostics is available as a free download at http://www.egestalt.com/. For further details please call (408) 689-2586 or email sales@egestalt.com . About Rapid7 Nexpose Nexpose proactively supports the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. This gives organizations immediate insight into the security posture of their IT environment by conducting over 92,000 vulnerability checks for more than 31,800 vulnerabilities. The solution leverages one of the largest vulnerabilities databases to identify vulnerabilities across networks, operating systems, databases, Web applications and virtual assets. Risk is classified based on real exploit intelligence combined with industry standard metrics such as CVSS, as well as temporal and weighted risk scoring. Nexpose provides a detailed, sequenced remediation roadmap with time estimates for each task. Nexpose is used to help organizations improve their overall risk posture and security readiness as well as to comply with mandatory regulations, including security requirements for PCI, HIPAA, ARRA HITECH ACT, FISMA (including SCAP, USGCB, FDCC and CyberScope Compliance), Sarbanes-Oxley (SOX) and NERC CIP. Nexpose is a Common Criteria EAL3+ product and received the SC Magazine Vulnerability Assessment Tool of the Year Award in 2012.
  • 3. About eGestalt Technologies Inc. eGestalt (www.egestalt.com) is a world-class, innovation driven, leading provider of cloud-computing based enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt SecureGRC was given a rating of 4.5 stars (out of a maximum 5) with 5 stars for Features, Support and Value for money by SC magazine in June 2012. In Feb. 2012 eGestalt President Anupam Sahai was named a Channel Chief by Everything Channel's CRN. eGestalt has been ranked in the Top 10 Vendors for Compliance Management and Data Access & Security by Hypatia Research, Q4 2011. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by SiliconIndia among the "Top 10 Security Companies to Watch." Its SecureGRC application was voted runner-up in the Managed Services Category at XChange Tech Innovators, Nov. 2010. In Sept. 2011 it was selected by Everything Channel as a 2011 CRN Emerging Technology Vendor as well as a 2011 Tech Innovator for Managed Services. Press Contact: Victor Cruz Principal, MediaPR.net For eGestalt Technologies vcruz@mediapr.net