Mapping and deficiency management

Map IT deficiencies, associate an ad hoc treatment plan and carry out a new Risk Assessment verification!
The DEFENCE IT Deficiency Mapping and Management module dashboard
Cyber ​​security: the magnifying glass is important to identify, map and manage any deficiencies

DEFENCE allows to manage the complete mapping process and shortcomings up until their resolution.

Thanks to DEFENCE it is possible to associate a specific treatment plan for each shortcoming and carry out a new Risk Assessment to determine if the shortcoming has been solved.

NECESSITY

SOLUTION

Address shortcomings arising from issues, external sources and risk assessments and other sources.
DEFENCE allows the monitoring of all issues and for each identified shortcoming it associates a treatment plan.

NECESSITY

Address shortcomings arising from issues, external sources and risk assessments and other sources.

SOLUTION

DEFENCE allows the monitoring of all issues and for each identified shortcoming it associates a treatment plan.

How DEFENCE maps and manages IT gaps

Monitors all issues related to IT assets

Sets up, schedules and manages treatment plan

Organizes shortcomings into categories and coordinates the operational "next step"

Six integrated modules

Asset Inventory

Find out more

IT Risk Control Model

Find out more

Risk Assessment

Find out more

Mapping and deficiency management

Find out more

Suppliers management

Find out more

IT & Data Protection

Find out more

Want to know more?