This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Risk assessment and workflow improvement in new version of Stream

Share this article:

Acuity has released the third version of its Stream risk manager software.

According to the company, features include an unlimited enterprise tree structure for organising risk registers and reporting views, as well as improved workflow to support planning and control of risk assessment and acceptance activities. Also contained within this release are multiple risk assessment schemes, a flexible hierarchical asset management capability and a simplified menu structure based on risks, controls, events and actions.

Acuity is offering a free single-user licence, along with a series of single-user and multi-user subscriber editions.

Simon Marvell, partner at Acuity Risk Management, said: “Risk management is a core competence for any public or private sector organisation. Stream is designed to support individual risk and compliance applications such as information security, supply chain risk management, health and safety and environmental management, as well as provide a holistic multi-application enterprise risk management solution.

“Organisations that rely on manual processes and spreadsheets can migrate these time consuming risk and compliance processes into Stream and also interface with third party solutions to maximise return on investment.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...