Call Us: 888 641 0500

IT Security Compliance Made Easy

Automate Key Elements of Your Information Security Program

From Complexity to Simplicity

Compliance Shield Video

Learn More about ComplianceShield

To manage information security compliance today, organizations must either adopt expensive, complex software systems that take months to deploy or piece together disjointed tools from a variety of vendors.  Now there is another choice.

ComplianceShield ™ combines our leading Information Security and Privacy Content with a suite of simple, integrated tools that allow you to build, document and track your information security program.  Loaded with templates and samples, ComplianceShield lets you quickly develop the documentation you need and then distribute it to users based on their role.

How Does ComplianceShield Automate IT Compliance?

The process of information security governance, risk and compliance (GRC) requires several key management disciplines that must be created and maintained.   The following table shows common Compliance Program elements and how ComplianceShield content and features address each area.

Compliance Features
Compliance Requirements
ComplianceShield Features

Document your security program with written information security policies and procedures.

Common Policy Library (CPL) – The CPL is a library of 32 sample information security policies that can easily be customized.  Based on Information Security Policies Made Easy, the CPL covers all essential security topics.

Update written information security policies at least once annually

Policy Management – The Common Policy Library (CPL) is updated to reflect the latest threats, technologies and regulatory requirements.  Easily tie policy updates to controls and management reports.

Define and document the information security organization
Job Description Library – The CPL Roles and Responsibilities library has prewritten job descriptions for 5 key security roles.
Define an information security program that reduces the risk to information assets and addresses compliance requirements.
CPL Control Library – Our CPL control library has over 300 common controls addressing the latest technologies, threats and regulatory requirements.  CPL controls can be mapped to frameworks including PCI-DSS, HIPAA, GLBA and ISO 27002
Monitor and track the status of your information security program
Compliance Dashboard – Quickly demonstrate compliance to senior management, auditors and business partners with a few simple reports. Easily view the information security posture of your entire organization in a single
compliance dashboard. 
Educate and Train Employees
User Policy Portal – Automatically distribute policies, procedures and training directly to users based on their role within the organization.  Users receive a custom inbox with the documents they need.
Develop an incident response program to manage reported incidents.
Incident Management – Track and manage details of information security incidents, including what was affected, incident categorization, date and time of
detection, declaration disclosure and resolution.
Provide periodic security awareness training to all employees and third parties.
PISC Security Awareness Training – Use our built-in security awareness training module to educate each user on basic security awareness principles.  Easily assign training to users and track status across the organization.
Learn More

Contact Us for more information.