Welcome!

News Feed Item

LockPath Drives Groundbreaking Compliance Solution

Bridges Gaps Between Compliance and Security, Providing Automated Auditing and Continuous Monitoring

OVERLAND PARK, KS -- (Marketwired) -- 02/25/14 -- LockPath, the leading provider of governance, risk management, and compliance (GRC) solutions, today announced the integration between its software, Keylight, the UCFinterchange (UCFi) and technology partner NetIQ. The integration ties together Secure Configuration Management (SCM), Configuration Auditing (CA) and LockPath's Keylight Platform to automate the IT audit data collection and continuous monitoring processes.

Built on the patented, award-winning Unified Compliance Framework, the UCFi marries the technical controls of NetIQ (such as machine configuration settings) to LockPath's audit mechanisms, allowing for complete automation of continuous monitoring and audit data collection.

"With the integration of these best-in-class solutions, we can now offer our customers an innovative, automated approach to IT auditing and continuous monitoring," says Chris Caldwell, CEO of LockPath. "The UCFi format will enable our customers to form deeper and more meaningful relationships within the GRC ecosystem and empower their audit and compliance programs."

The UCFinterchange facilitates communication between SCM, CA, and GRC tools. IT specialists can now automatically perform business-wide configuration audits and map the results to corresponding policies and regulations. Compliance officers are then able to generate powerful, in-depth reports on these findings and route identified risks through the remediation process. This standardized and automated approach streamlines customer audit and IT security efforts, creates efficiencies within compliance programs, and enables users to make better and faster business decisions.

"We built an intelligent interchange platform to outpace the newest and still-emerging security and GRC guidelines," says Craig Isaacs, CEO of Unified Compliance Framework. "All indications point to full integration across GRC, SCM and CA tools will soon become a mandate and we are thrilled to have LockPath and NetIQ spearhead this initiative."

Keylight is the first fully-integrated GRC solution to meet the needs of both compliance officials and IT experts. Through their partnerships with the UCF and NetIQ, LockPath customers can leverage best-practice framework controls, gain valuable insights into configuration deficiencies and network vulnerabilities, and prioritize risks.

Attendees at this week's RSA Conference can see a demonstration of Keylight's UCFi integration at LockPath's booth (#238). More information on Keylight is available at www.lockpath.com/products.

About LockPath
LockPath brings a flexible, pragmatic approach to governance, risk management, compliance and security programs. Its solutions help organizations gain a deeper understanding of their security and risk posture while reducing their audit fatigue by aligning people with their processes and the enabling technology. LockPath provides the platform to efficiently manage and harvest meaningful data from GRC activities, including regulatory compliance, policy life cycle, information security risk data, incidents, disaster recovery plans, third party assessments and internal audits. LockPath is headquartered in Kansas City. Visit LockPath.com to learn more.

About Unified Compliance and the UCF
Since 1992, Unified Compliance has developed ground-breaking tools to support IT best practices, with a focus on solutions and processes that further the science of compliance, including harmonization methods, metrics, systems continuity and governance. The UCF was created by Dorian Cougias and his research partner, Marcelo Halpern of the international law firm Perkins Coie, which oversees all legal aspects of the UCF. More information can be found at www.unifiedcompliance.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...