IT Security Made Easy with Compliance Shield
Establish, manage and document your information security program in one simple, integrated interface!
How do you build and manage an information security program that will demonstrate compliance to management and outside parties? Today, organizations must either adopt expensive, complex software systems that take months to deploy or piece together disjointed tools from a variety of vendors. Now there is another choice.
The Solution: ComplianceShield
ComplianceShield ™ combines our Security and Privacy Compliance Content with a suite of simple, integrated security management tools that allow you to build, document and track your information security program. With a simple user interface and expert information security guidance, ComplianceShield ™ integrates all of the essential security management functions into a single, integrated system that is easy to manage and deploy.
Quickly Define your Information Security Program
Use our Compliance Wizard to dramatically simplify the process of measuring your IT risk and compliance posture. Within minutes you have a custom security program baselines based on our best-practices security library.
Develop Information Security Policies – Common Policy Library (CPL)
Save time and money developing security policies with over 20 pre-written security policy templates. Our unique Common Policy Library (CPL) has over 300 controls addressing the latest technologies, threats and regulatory requirements.
Measure and Track User Acknowledgement
Automatically distribute policies, procedures and training directly to users based on their role within the organization. Verify user understanding by tying assessments to specific policies. A flexible reporting system enables managers to run compliance and gap reports on groups or the entire enterprise.
Information Security Awareness Training
Use our built-in security awareness training module to educate each user on basic security awareness principles. Our training covers key topics including: Access Control, Email and Web Usage, Mobile Security, Information Classification and security incident reporting.
Measure and Track Control Compliance
Easily view the information security posture of your entire organization in a single compliance dashboard. Validate your compliance program by using our IT Risk Scoring report. Custom reporting modules automatically feed results of various modules to provide a holistic view of the information security program.
Manage Information Security Incidents
Manage your entire incident reporting, management and response tasks through a simple, integrated interface. Built-in incident types takes the guesswork out of incident reporting.