Centraleyes Expands Automated Risk Register to Cover all Enterprise Risk

Centraleyes Expands Automated Risk Register to Cover all Enterprise Risk

SaaS cyber risk management company, Centraleyes, has further augmented its cloud-based GRC platform with the release of its next-generation Enterprise Risk Register – the first of its kind in the industry.

In addition to the automated functionality introduced earlier this year, Centraleyes users can now:

  • Add internally identified enterprise risks, enabling comprehensive risk management across their organization.
  • Use custom tagging to allow security teams to organize and filter risks based on multiple, personalized criteria.
  • Directly link gaps and open tasks to risks for better management and strategic planning.

“The most recent major updates to the Centraleyes platform introduce groundbreaking features from a GRC perspective,” says Yair Solow, CEO at Centraleyes. “The automated risk register builds and improves on the existing functionality, enhancing the way you can quantify and manage risks. It’s simply 10 times faster and 10 times better than any other platform on the market.”

Also Read: Password-less Technology Can Help Fight Phishing Attacks

This most recent feature release follows the Centraleyes 4.0 launch that was released last month, which introduced smart mapping functionality for cross-walking shared compliance and risk controls across multiple standards and frameworks. The release also included an advanced Tenable integration and the ability for users to adjust target scores within the platform.

“Resilience and risk management is ultimately a data-driven discipline,” Solow continues. “The more relevant information you can aggregate about your business’s ecosystem, the more accurate your unique risk profile becomes. That accuracy is crucial in allowing security teams to identify and mitigate threats.”

He concludes, “Ultimately, our core purpose with Centraleyes is to provide a real-time, automated and accurate view of the organization’s risk and compliance levels.”

For more such updates follow us on Google News ITsecuritywire News