Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

LockPath Expands IT GRC Reporting in Keylight 3.0

LockPath, an Overland Park, Kansas-based provider of governance, risk management and compliance (GRC) solutions, this week launched version 3.0 of its Keylight platform, an update that brings improved reporting features and new content integration capabilities, as well as advanced assessment tools.

LockPath, an Overland Park, Kansas-based provider of governance, risk management and compliance (GRC) solutions, this week launched version 3.0 of its Keylight platform, an update that brings improved reporting features and new content integration capabilities, as well as advanced assessment tools.

“The redesigned user interface simplifies reporting and allows permitted users to report on all data and quickly generate a variety of charts for stakeholders,” the company explained. “With real-time data previews, users can instantly see their report take shape as they drag and drop fields, flatten reports, apply filters and sort criteria leveraging the full-screen work area.”

Keylight 3.0 enables customers to create custom tables and fields in the Keylight Vendor Manager application via its Dynamic Content Framework (DCF), the company said. In addition, users can use formulas inside record fields to automatically calculate risk levels from aggregated data and issue assessments to identify and mark risk items for remediation.

With LockPath’s Keylight 3.0 Platform, users can:

• Generate findings to speed investigations and remediation – Keylight automatically creates hyperlinked records based on assessment responses

• Construct dynamic policies linked to controls – Vendor policies can be created on the fly based on their individual responses to assessment questions

• Access pertinent assessments – Users are notified of any pending assessments at login and a “My Assessments” tab with links to each individual assessment simplifies navigation

• View scores and color-coded scoring labels can be added for reporting

Advertisement. Scroll to continue reading.

• Match the structure of PCI DSS 2.0 and DIACAP 8500.2 assessments to the order prescribed by the Unified Compliance Framework (UCF)

Other advancements in the latest release of Keylight include workflow improvements, a Compliance Manager that provides direct image and control insertion, dynamic policy statement generation, as well as a Threat Manager module that enables users to export vulnerability scan data, and integrate with McAfee Vulnerability Manager via ODBC.

Keylight 3.0 is available immediately.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...