Just when you thought security software was getting simpler, along comes security risk management, a genre of tools whose purpose is to provide CSOs with a Star Trek-like dashboard view of information security vulnerabilities and incidents across the enterprise. The idea is not only to oversee the minutiae but also to manage the enterprise’s level of risk in a holistic manner. Well, that’s the goal anyway. Bent under the weight of terms like vulnerability, compliance configuration management and security event monitoring, security risk management is still sorting itself out, says Mike Rasmussen, director of research in information security for Giga Information Group. “If only the vendors would stop misusing the terms risk, vulnerability and threat, it would be much easier to understand,” he says.In the vulnerability and configuration management space is Archer Technologies’ Security2002, which collects information on network vulnerabilities, baseline configurations and control standards, and distributes them to system administrators. The nice thing about Security2002 is that it includes a security feed on the latest threats, which negates the need for subscriptions to services like BugTraq. Going one step further, Cogentric’s Alcon gives prioritized remediation plans for security incidents. It also gives on-demand views of vulnerability, incident and risk ratings; continuous and prioritized updates of security vulnerabilities and threats; accessibility rights to information by all stakeholders; and historical information on threats, complete with time- and event-based comparisons. So if you have an Oracle system and a new Oracle security threat is found, Alcon will tell you about the threat, compare it to past threats, and indicate how and which systems to protect and whether the threat is a top priority. Qinetiq Trusted Information Management is another vendor playing in this sandbox (ignore the cute spelling and pronounce it “kinetic”). Xacta’s Web C&A product provides another variation on the theme, helping users make their systems compliant with government and industry security certifications. According to Xacta, Web C&A guides users through a step-by-step process to determine risk posture, and assess system and network configuration compliance with applicable regulations, standards and industry best practices. Those are in accordance with the Department of Defense Information Technology Security Certification and Accreditation and the National Information Assurance Certification and Accreditation processes, and the Director of Central Intelligence Directive, as well as those for the Health Insurance Portability and Accountability Act and the Graham-Leach-Bliley Act (better known as HIPAA and GLB, respectively). Xacta’s Commerce Trust product assesses systems and keeps administrators up-to-date on vulnerabilities to certification compliance.Ideally, security risk management tools will do all of the above in one tidy package. Steve Katz says this is exactly the type of product he needed in his former CISO positions at Citigroup and Merrill Lynch; he left the practitioner’s chair and put out a shingle at Security Risk Solutions, where he consults to Qinetiq and other players in this developing market. Right now vendors are offering pieces of the pie, but no one has the entire equation down yet, Rasmussen says. “It all needs to merge and create a single product with every aspect of strong security risk management,” he says. That day is not far offRasmussen points out the recent partnership of eSecurity and SecurityFocus as emblematic of the field’s ongoing consolidation. Related content news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Regulation Government news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe