SlideShare a Scribd company logo
1 of 2
eGestalt Announces Next Generation Security Posture Management with Aegify

Cloud-based, Software-only solution is powered by Rapid7 technology.

Santa Clara, CA (USA), December 12, 2012 -- eGestalt Technologies
( http://www.eGestalt.com ), a provider of IT security monitoring and compliance management for
SMBs and enterprises, today announced Aegify, the world’s first completely integrated and unified
IT-GRC and cloud-based Security Posture Management (SPM) product using a completely
software-based solution.

Security Posture Management (SPM) is the art and science of monitoring and managing business
security status by orchestrating process, people, and technological resources to achieve security
objectives. This involves identifying business critical IT assets, evaluating their risks based on
vulnerabilities and the impact of potential threats, and mapping results directly to controls to
initiate appropriate countermeasures.

Aegify SPM is powered by Rapid7’s Nexpose vulnerability management technology, which scans
physical and virtual networks, databases, operating systems and web applications, enabling
customers to remediate vulnerabilities and misconfigurations and to enforce policies. Rapid7
( http://www.rapid7.com ) is a leading provider of IT security risk management solutions used by
more than 2,000 enterprises and government agencies in more than 65 countries.

Aegify is a complete integration of eGestalt’s HIPAA and PCI compliance tool SecureGRC
( http://www.egestalt.com ), with security posture management capability using an innovative,
patent-pending expert systems technology to automatically map the security vulnerabilities to
compliance mandates. The tool can import data from other standard vulnerability scanners in the
industry as well.

Says eGestalt President Anupam Sahai, “We are very excited about the strategic partnership with
Rapid7. Aegify is the first true, software- and cloud-based unified security and IT-GRC solution on
the market with end-to-end automation including vendor management and support for multiple
compliance business frameworks such as PCI, HIPAA/HITECH, SOX, FISMA, and GLBA. This is
also the first product in the market which can automatically map security vulnerabilities to
compliance mandates using an innovative expert systems approach thereby eliminating manual
work required and saving significant costs. It advances the state of the art in the industry besides
still continuing to be 10 to 20 times more cost-effective than any other competing solution.”

There are thousands of security exposures identified and documented as ‘vulnerabilities’. Tools
used by cyber-attackers are very sophisticated and attackers can breach the perimeter and steal
data within seconds and minutes. Businesses are often caught unaware, discovering the breach
only weeks and sometimes months afterwards.

“Aegify SPM brings a new cloud-based approach to managing security posture that is innovative,
easy to use, and extremely valuable for defenders,” said Sheldon Malm, Senior Director of
Strategic Partners and Alliances at Rapid7. “By leveraging Rapid7 technology, Aegify SPM
provides a comprehensive view of exposure risk that is directly connected to business assets and
compliance management. This is a complementary offering that will benefit our joint customers.”

A cloud application, Aegify’s SPM “all hands on deck” threat management approach performs
asset discovery, vulnerability analysis, risk profiling, threat impact analysis and compliance
mapping. It can identify 92,000 vulnerability checks for more than 31,800 vulnerabilities across
physical and virtual networks, operating systems, databases, and Web applications.

The cloud-based Aegify engine is driven in large part by eGestalt’s flagship product Aegify
SecureGRC, a unified security and compliance management tool that includes all of the
necessary security and IT-GRC functionality required to gain control and improve compliance
levels across more than 400+ regulations.

While the framework allows for the easy plug-in of any regulation or standard, eGestalt currently
offers to the channel ready-to-roll compliance services with built-in frameworks to support the
most stringent and popular regulations including PCI, HIPAA/HITECH, SOX, FISMA, and GLBA,
as well as more country-specific regulations. Extensible with built-in frameworks, the Aegify
SecureGRC solution offers a simplified approach for PCI, HIPAA/HITECH and other country
specific frameworks ready-to-use out of the box. It provides automated mapping of a network’s
security posture to compliance controls.

All told, the integrated Security Posture Management solution Aegify offers a single approach to
security and compliance management, and because it is delivered as SaaS, it is available at low
cost due to its “pay –as-your-grow” model.

A Community Edition for diagnostics is available as a free download at http://www.egestalt.com/.
For further details please call (408) 689-2586 or email sales@egestalt.com.

About eGestalt Technologies Inc.:
eGestalt ( http://www.egestalt.com ) is a world-class, innovation driven, leading provider of cloud-
computing based enterprise solutions for information security and IT-GRC management. eGestalt
is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East.
eGestalt SecureGRC was given a rating of 4.5 stars (out of a maximum 5) with 5 stars for
Features, Support and Value for money by SC magazine in June 2012. In Feb. 2012 eGestalt
President Anupam Sahai was named a Channel Chief by Everything Channel’s CRN. eGestalt
has been ranked in the Top 10 Vendors for Compliance Management and Data Access & Security
by Hypatia Research, Q4 2011. eGestalt was nominated Breakthrough Technology Vendor at
XChange Americas, Aug. 2010, and selected by SiliconIndia among the “Top 10 Security
Companies to Watch.” Its SecureGRC application was voted runner-up in the Managed Services
Category at XChange Tech Innovators, Nov. 2010. In Sept. 2011 it was selected by Everything
Channel as a 2011 CRN Emerging Technology Vendor as well as a 2011 Tech Innovator for
Managed Services.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
For eGestalt Technologies
Santa Clara, CA - USA
+1 978-594-4134
vcruz@mediapr.net
http://www.egestalt.com

More Related Content

What's hot

Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2Redazione InnovaPuglia
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentElasticsearch
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certificationdanb02
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Io t analytics panel
Io t   analytics panelIo t   analytics panel
Io t analytics panelMassTLC
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...flashnewsrelease
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 

What's hot (20)

Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Chrome Summary
Chrome SummaryChrome Summary
Chrome Summary
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certification
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Io t analytics panel
Io t   analytics panelIo t   analytics panel
Io t analytics panel
 
MEDS
MEDSMEDS
MEDS
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 

Similar to eGestalt Announces Next Generation Security Posture Management with Aegify

Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event ManagementSatya Harish
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 

Similar to eGestalt Announces Next Generation Security Posture Management with Aegify (20)

Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Redington Value Journal - September 2016
Redington Value Journal - September 2016Redington Value Journal - September 2016
Redington Value Journal - September 2016
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

eGestalt Announces Next Generation Security Posture Management with Aegify

  • 1. eGestalt Announces Next Generation Security Posture Management with Aegify Cloud-based, Software-only solution is powered by Rapid7 technology. Santa Clara, CA (USA), December 12, 2012 -- eGestalt Technologies ( http://www.eGestalt.com ), a provider of IT security monitoring and compliance management for SMBs and enterprises, today announced Aegify, the world’s first completely integrated and unified IT-GRC and cloud-based Security Posture Management (SPM) product using a completely software-based solution. Security Posture Management (SPM) is the art and science of monitoring and managing business security status by orchestrating process, people, and technological resources to achieve security objectives. This involves identifying business critical IT assets, evaluating their risks based on vulnerabilities and the impact of potential threats, and mapping results directly to controls to initiate appropriate countermeasures. Aegify SPM is powered by Rapid7’s Nexpose vulnerability management technology, which scans physical and virtual networks, databases, operating systems and web applications, enabling customers to remediate vulnerabilities and misconfigurations and to enforce policies. Rapid7 ( http://www.rapid7.com ) is a leading provider of IT security risk management solutions used by more than 2,000 enterprises and government agencies in more than 65 countries. Aegify is a complete integration of eGestalt’s HIPAA and PCI compliance tool SecureGRC ( http://www.egestalt.com ), with security posture management capability using an innovative, patent-pending expert systems technology to automatically map the security vulnerabilities to compliance mandates. The tool can import data from other standard vulnerability scanners in the industry as well. Says eGestalt President Anupam Sahai, “We are very excited about the strategic partnership with Rapid7. Aegify is the first true, software- and cloud-based unified security and IT-GRC solution on the market with end-to-end automation including vendor management and support for multiple compliance business frameworks such as PCI, HIPAA/HITECH, SOX, FISMA, and GLBA. This is also the first product in the market which can automatically map security vulnerabilities to compliance mandates using an innovative expert systems approach thereby eliminating manual work required and saving significant costs. It advances the state of the art in the industry besides still continuing to be 10 to 20 times more cost-effective than any other competing solution.” There are thousands of security exposures identified and documented as ‘vulnerabilities’. Tools used by cyber-attackers are very sophisticated and attackers can breach the perimeter and steal data within seconds and minutes. Businesses are often caught unaware, discovering the breach only weeks and sometimes months afterwards. “Aegify SPM brings a new cloud-based approach to managing security posture that is innovative, easy to use, and extremely valuable for defenders,” said Sheldon Malm, Senior Director of Strategic Partners and Alliances at Rapid7. “By leveraging Rapid7 technology, Aegify SPM provides a comprehensive view of exposure risk that is directly connected to business assets and compliance management. This is a complementary offering that will benefit our joint customers.” A cloud application, Aegify’s SPM “all hands on deck” threat management approach performs asset discovery, vulnerability analysis, risk profiling, threat impact analysis and compliance mapping. It can identify 92,000 vulnerability checks for more than 31,800 vulnerabilities across physical and virtual networks, operating systems, databases, and Web applications. The cloud-based Aegify engine is driven in large part by eGestalt’s flagship product Aegify
  • 2. SecureGRC, a unified security and compliance management tool that includes all of the necessary security and IT-GRC functionality required to gain control and improve compliance levels across more than 400+ regulations. While the framework allows for the easy plug-in of any regulation or standard, eGestalt currently offers to the channel ready-to-roll compliance services with built-in frameworks to support the most stringent and popular regulations including PCI, HIPAA/HITECH, SOX, FISMA, and GLBA, as well as more country-specific regulations. Extensible with built-in frameworks, the Aegify SecureGRC solution offers a simplified approach for PCI, HIPAA/HITECH and other country specific frameworks ready-to-use out of the box. It provides automated mapping of a network’s security posture to compliance controls. All told, the integrated Security Posture Management solution Aegify offers a single approach to security and compliance management, and because it is delivered as SaaS, it is available at low cost due to its “pay –as-your-grow” model. A Community Edition for diagnostics is available as a free download at http://www.egestalt.com/. For further details please call (408) 689-2586 or email sales@egestalt.com. About eGestalt Technologies Inc.: eGestalt ( http://www.egestalt.com ) is a world-class, innovation driven, leading provider of cloud- computing based enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt SecureGRC was given a rating of 4.5 stars (out of a maximum 5) with 5 stars for Features, Support and Value for money by SC magazine in June 2012. In Feb. 2012 eGestalt President Anupam Sahai was named a Channel Chief by Everything Channel’s CRN. eGestalt has been ranked in the Top 10 Vendors for Compliance Management and Data Access & Security by Hypatia Research, Q4 2011. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by SiliconIndia among the “Top 10 Security Companies to Watch.” Its SecureGRC application was voted runner-up in the Managed Services Category at XChange Tech Innovators, Nov. 2010. In Sept. 2011 it was selected by Everything Channel as a 2011 CRN Emerging Technology Vendor as well as a 2011 Tech Innovator for Managed Services. Press & Media Contact: Victor Cruz, Principal MediaPR.net Inc For eGestalt Technologies Santa Clara, CA - USA +1 978-594-4134 vcruz@mediapr.net http://www.egestalt.com