Valkerie™ works 24/7 across your entire digital landscape monitoring and protecting your most sensitive information. She not only monitors your security controls for real-time effectiveness but will help you reach and stay compliant across the cyber security domains below.
This control family relates to the testing, and evaluating of security controls to determine that they are implemented correctly, working as intended and meeting the required security requirements of an organization.
This control family relates to the situational awareness of anomalous conditions, IT resources, physical access and other critical resources in real or near real-time context.
This control family relates to printed and digital content. It deals with how that content is stored accessed, labeled, transported and destroyed.
This control family relates to the events that occur on or to information systems and their components like applications, databases, services. This control helps answer the question of "who", "what", "when", and sometimes how activities and events happened.
This control family relates to the responsibility for assets. The objective of this control is to identify information assets in scope of your cyber security management program. It answers questions about inventory like how they are managed and controlled based on their importance or classification. Generally includes creation, processing, storage, transmission, deletion, destruction and owners.
Cyber security is everyone's job in an organization. Leaders have key responsibilities to make sure that their is an effective program organization wide. The scope and content should be directly tied to the scope of your Cyber Security Program.
This control family relates to how users, applications and systems communicate with each other as well as, with other resources.
This control family relates to uniquely identifying users of a system or application and the ability to prove that a user, system or application is who it claims to be.
This control family relates to responding to a cyber security incident methodically. It also relates to containing, minimizing and learning from the incident.
This control family relates to the routine maintenance of systems and their components. This includes the maintenance of your cyber security program and controls. It is a crucial part of keeping your systems and applications updated.
This control family relates to the system and information integrity to ensure systems and information can be validated.
This control family relates to the management of change to systems, applications, clouds, user or networks. It is the discipline of identifying components, versions and baselines and controlling changes made to them. Effective configuration management identifies, controls, records and reports on any functional, physical, or change to controlled systems, applications, clouds, users, and networks.
This control family relates to assessment, identification and evaluation of risk and their impacts. It is meant to be a life cycle of the cyber security program. It is also meant to prioritize, implement and maintain risk reducing measured recommended from the risk assessment process.
This control family relates to the recovery process after an incident to ensure the timely recovery of systems or assets. It is part of the Risk Management lifecycle.
This control family relates to the exchange of information in our environments. It is the system boundaries and layered defenses we use to protect our assets and data.