RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

GlobalTrust Information Security Manager (GTISM)

Product
Developers: GlobalTrust Solutions
Date of the premiere of the system: December, 2014
Technology: Firewall,  cybersecurity - Information loss preventions,  cybersecurity - the Fraud detection system (fraud),  cybersecurity - Information management and events in a security system (SIEM)

In 2015 GlobalTrust will provide a product prototype - GlobalTrust Information Security Manager (GTISM) - the self-trained expert system of process automation of information security management.

At first the Workspace interface - a workplace of the head of service cybersecurity will be made, then the module of management of compliance of Compliance will be fastened to it, then the module of risk management Risk Management and the knowledge base of KnowlegeBase (KB), further the module of management of politicians of Policy Management, etc. is added. In total there will be about 20 modules. As a result of GTISM will automate all processes of management of cybersecurity described in international standards.

Everything will work in the mode of cloud web service with access on a subscription. Results of work of all users will collect in KB and will be able to be used by all others without violation of the mode of confidentiality of information. At the expense of it a system will samoobuchatsya, the quicker, than it is more than users and what more intensively they work with a system as. Each new user of a system will have an opportunity to use experience and results of work of all other users. Thanks to it, even low-skilled users, will be able easily to receive significant results: create the report on compliance to this or that standard, create the risk register or model of threats for the organization, to develop a set of ORD, the program of increase in awareness, to plan the budget on cybersecurity, to estimate efficiency of SMIB, to create the reporting under incidents, to estimate the level of security of IT infrastructure and hundreds of other tasks which it perhaps never faced earlier.

Important point is the possibility of operational receiving reliable data by the head of service cybersecurity from different the information security facility (ME, IPS, SIEM, AV, DLP, scanners, etc.). Otherwise all management of cybersecurity will remain on paper, and will work as the programulki in itself. GTISM will obtain these state-of-health data of the information security facility (statistics, the reporting) via special connectors. It will allow the head of cybersecurity to control all picture of cyber security in the mode of the situational center. Connectors we will make under each specific organization for those the information security facility which should be connected to GTISM. Thanks to it, including, efficiency and productivity of any information security facility connected to GTISM it will be possible to estimate and compare to others the information security facility (taking into account ownership cost) in the automatic mode.

In GTISM it will be possible to compare indicators of any process of cybersecurity (levels of compliance, risks, awarenesses, competence, security, etc.) to indicators of other organizations, for example, with average values on the industry, on regions, etc. It will be at any time clear not only where we are rather specific standards or specific risks, but also concerning other organizations similar to ours.

As GTISM is a service, any participant (user) of a system at any time will be able to use the help of our consultants and analysts, as well as the help of other active participants.

There are no analogs of GTISM and in the nearest future will not be since continually our own simple, but effective KNOW-HOW. We will welcome investors, but we will be able and to do without them.