TrustedAgent GRC V5.0.4
June 02, 2014
TrustedAgent offers two forms of pricing: Perpetual license: Typical, small on-premise deployment does not exceed £38,790. Medium to larger organization perpetual license starts at £13,638. Annual maintenance is 25 percent of the software licensing cost. The customer is responsible for the provisioning of required hardware and operating systems for the servers running the TrustedAgent application. Subscription as cloud-based service (SaaS): Initial subscription starts at £2,728 per year for 5
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Content authoring module.
- Weaknesses: Looks to be time consuming to initially set up and add in new assets as needed.
- Verdict: Had all the elements necessary for full enterprise risk management with an attractive price point, though it does have a lot of manual efforts.
TrustedAgent GRC v5.0.4 is an IT risk and governance tool modelled after the NIST 800-37 risk management framework - with two added steps that include define, categorise, plan, implement, assess, manage, authorise and monitor. The TrustedAgent Risk Management and Compliance Framework is also consistent with other industry information security management frameworks, including ISO 27001 and COBIT. TrustedAgent platform automates IT governance, risk and compliance processes including authorisation, compliance, policy management, incident management, vendor and enterprise risk, and vulnerability management in one centrally managed application.
TrustedAgent centrally captures, measures and brings visibility to business and IT risks across business units, operations, functions and subsidiaries or vendors. The define effort starts with an inventory entity which can be a system, site program, vendor or other custom element. There is some effort that goes into setting up the hierarchy and adding in all the relevant detailed data. Entity data can be manually entered or imported via XML or Excel. Users will be configured at this point and manually mapped to entity items. Hardware and software assets will be defined as part of the entity using the same process. This is all accomplished through a web-based user interface and the navigation is much like browsing a web page. Once the basic entity, business definitions and asset definitions are created, TrustedAgent communicates and tracks adherence to policies and procedures, conducts risk reviews to particular standards, identifies exposed risk areas and manages remediation and mitigation activities.
Risks identified from audits, control assessments and vulnerability data are correlated, managed and linked to the affected asset. TrustedAgent offers multiple methods for risk-level determination, corrective action and risk treatment. Findings can lead to a corrective action. The workflow is manual in a sense that one needs to find and assign it a corrective action. There is a policy creation tool using some supplied content if one wishes to create policies versus importing them. The continuous monitoring feature helps keep data current and the integration with the incident management module ensure incidents, vulnerability assessments and compliance controls are identified, evaluated, retested and reported. TrustedAgent is built on a common control framework so the work one does for one body is mapped to the others seamlessly. The control and compliance interface is very good, along with the content authoring module. Users can create content on the fly - reports, etc. - adding anything in the system with little need for technical knowledge. This interface is much like a Google Docs interface and was really a strong plus for TrustedAgent.
Reporting was done well: numerous standard reports are available along with ad-hoc reporting using the tool described above with dashboards, metrics and geo-maps presented graphically with drill-down capabilities.
TrustedAgent is often installed in virtualised environments running on two segregated hardware boxes. The web/application server typically runs Tomcat 7, and the database server runs Microsoft SQL Server 2008. Most deployments integrate with Active Directory and a smart card as preferred authentication methods for users. Both the web/application and database servers use Windows 2008 Server R8 as the operating system.
Trusted Integration provides standard eight-hours-a-day/five-days-a-week phone, email and web support for the first year, and subsequent years if annual maintenance is purchased or a subscription is renewed at 25 percent of the license cost. Prices are US-based, thus indicative only.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry