Acuity has been listed by Gartner as a Representative Vendor of Security Operations, Analytics and Reporting (SOAR) technologies, associated with the Threat and Vulnerability Management Use Case, one of three Use Cases in the report. Security operations, analytics and reporting (SOAR) technologies rationalize cross-vendor security controls in asset and business contexts.Gartner, Innovation Tech Insight for Security Operations, Analytics and Reporting Oliver, Rochford, Paul E. Proctor, 11 November 2015
This edition of the Acuity Newsletter includes: - The 5* review from Secure Computing magazine- Acuity is a ‘hot cyber security company to watch 2016’- Acuity to sponsor 2016 Infosecurity Europe- Website refresh- Gartner lists Acuity as a vendor for Security Operations, Analytics and Reporting (SOAR) technologies - Latest STREAM release and Version 5 planning
Acuity Risk Management has been listed in the Cybersecurity 500. Created and maintained by Cybersecurity Ventures of Silicon Valley, the list names the hot cybersecurity companies to watch in 2016. Acuity is included at no. 301 globally and no. 41 in Europe. In the Governance Risk and Compliance (GRC) category Acuity is no. 10 globally and no. 2 in Europe. You can access the list from the button below.
Acuity Risk Management are proud to be sponsoring the SC Congress London 2016 – Taking place on February 10th at the ILEC Conference Centre. Further information regarding this event can be found here
Acuity Risk Management are pleased to announce they will be sponsoring the 4th CEE Cyber and Information Security Showcase event in Vienna on the 23 - 24th February 2016 for a 3rd successive year.
A STREAM Content Uploader configured with ISO 9001 (Quality Management System) content for use with Single-User (SU) Subscriber Editions of STREAM Software. Download Datasheet
STREAM V4 has been given the highest available 5 star rating by Secure Computing Magazine in its 2015 Risk and Policy Management Group test.
Acuity Risk Management are proud to have been a sponsor of the ISC2 EMEA Security congress Event in Munich on the 20 - 21st October 2015 ISC Security Congress Agenda
This edition of the Acuity Risk Management Newsletter includes; A SWOT analysis for STREAM Version 4; STREAM for Technical Vulnerability Management; Cyber Security Risk Management; New Application Content. Download Newsletter
Vulnerability scanning tools such as Qualys and Nessus are used to scan Hosts / IP Ranges in order to identify potential infrastructure vulnerabilities. The outputs from such tools, as well as the results from Penetration Testing activities, can be automatically uploaded into STREAM for progression and tracking. In addition, the register of Assets in STREAM can be automatically reconciled against an external Asset Management / CMDB data source, to ensure that critical assets have been registered and as a baseline for ongoing scanning operations.