Common Security Compliance Threads Help Save Effort And Money, Says ReymannGroup

Share Article

Third Brigade Study Reviews 13 Regulations, Uncovers 15 Common Threads

Third Brigade (http://www.thirdbrigade.com), a security software company specializing in host intrusion detection and prevention systems (IDS/IPS), today announced a new white paper outlining 15 common security compliance threads uncovered through research conducted by ReymannGroup on behalf of Third Brigade. According to ReymannGroup, understanding the common compliance threads enables organizations to adopt a more proactive and cost-effective compliance initiative– continuously managing information security and technology risk.

The white paper is available on the Third Brigade website at: http://downloads.thirdbrigade.com/download135/

“Boards and senior management are now legally accountable for a company’s security and compliance success or failure,” said Paul Reymann, CEO of ReymannGroup. “By identifying and addressing common compliance threads, an enterprise can reduce cost and minimize duplication of effort.”

Through hundreds of conversations and projects with clients and other companies over the last several years, ReymannGroup identified 15 common security compliance threads in today’s key laws, rules and guidelines applicable to a wide range of industries. Companies that focus on complying with these common threads are enabling cost-effective risk management and achieving compliance by default.

“Enterprises are under intense and competing pressures to ensure compliance while reducing costs,” said Wael Mohamed, president and CEO, Third Brigade. “ReymannGroup research has highlighted the importance of selecting and adopting technologies — like host intrusion defense — that can address a broad range of these common security mandates.”

This white paper highlights several of the key information security and IT risk management laws, regulations, and best practice guidelines across multiple industries, and explores the common compliance threads and enabling technologies that provide a common framework of controls. While they may apply to different industries, the mandates are based on a common foundation of recognized best practice risk management principles. Regulations reviewed in the ReymannGroup research included: PCI, HIPAA, SOX, GLBA, BASEL II, FISMA, NIST Special Publication 800-53, MITS, PCAOB, COSO, COBIT, SysTrust and SAS-70.

ReymannGroup also undertook a comprehensive evaluation of the applicability of Third Brigade’s host intrusion defense solution as a means to address these common security compliance threads. The whitepaper, titled Third Brigade: A New Approach to Addressing Regulatory Compliance concludes that Third Brigade gives organizations greater control, and delivers measurable value, to stakeholders across the enterprise. A description of Third Brigade’s capability to enable each of the 15 common security compliance mandates is included in a summary table.

About ReymannGroup
ReymannGroup, Inc. provides finance, healthcare, retail and manufacturing, and local and state government subject matter expertise. Our firm helps companies evaluate their information security infrastructure, determining exposure to vulnerabilities and threats, prioritizing solutions, and complying with legal and regulatory requirements. ReymannGroup provides customers with independent, highly-qualified professionals, authors of regulations and books, and subject matter experts familiar with industry regulations and best practices.

About Third Brigade
Third Brigade (http://www.thirdbrigade.com) specializes in providing host intrusion defense systems to organizations that need to detect and prevent attacks that exploit vulnerabilities in mission critical systems. Third Brigade Deep Security allows businesses to apply comprehensive security profiles to hosts that protect against known and zero-day attacks using deep packet inspection. It helps ensure compliance and the 24-7 availability of critical systems, provides a virtual patch for software vulnerabilities, and allows organizations to deliver Internet-based services with greater security and confidence. Unlike other host intrusion detection and prevention systems, Third Brigade Deep Security provides broader, faster and simpler protection. Third Brigade. That’s control.

Note: “Third Brigade”, “Deep Security Solutions”, and the Third Brigade logo are trademarks of Third Brigade, Inc. and may be registered in certain jurisdictions. All other company and product names are trademarks or registered trademarks of their respective owners.

For more information:
Laura Maio
Media & Analyst Relations
Third Brigade, Inc.
(T) 613-599-4505 x2238
(M) 613-219-2800
laura.maio(at)thirdbrigade.com

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Laura Maio
Third Brigade
613-599-4505-2238
Email >
Visit website