Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
CYRISMA is a complete ecosystem for cyber risk assessment and mitigation. With multiple high-impact cybersecurity tools rolled into one easy-to-use, multi-tenant SaaS product, CYRISMA enables you to manage your own and your clients' cyber risk in a holistic manner.
Platform capabilities include (everything included in the price):
-- Vulnerability and Patch Management
-- Secure Configuration Scanning (Windows, macOS, Linux)
-- Sensitive data discovery scanning; data classification and protection (data scans cover both on-prem systems and cloud apps including Microsoft Office 365 and Google Workspace)
-- Dark web monitoring
-- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials)
-- Active Directory Monitoring (both on-prem and Azure)
-- Microsoft Secure Score
-- Cyber risk quantification in monetary terms
-- Cyber risk score cards and industry comparison
-- Complete cyber risk assessment and reporting
-- Cyber risk mitigation
Request a demo today to see CYRISMA in action!
Description
Huntsman Security's Essential 8 Auditor is an automated tool that assesses cyber risk, specifically tailored to help organizations meet the compliance requirements of the Australian Cyber Security Centre's Essential Eight framework. By providing a measurable evaluation of cyber maturity through the examination of security controls across various endpoints and systems, it generates an immediate maturity score along with a prioritized list for remediation actions. Its agentless design allows for easy self-installation, making it versatile enough for both large enterprises and smaller organizations. Additionally, it seamlessly integrates with current IT infrastructures to automate the processes of data collection and reporting, thus eliminating the necessity for manual evaluations and minimizing biases. Essential 8 Auditor features real-time dashboards, comprehensive reporting capabilities, and benchmarking tools, empowering organizations to monitor their progress over time. This tool proves to be especially advantageous for entities operating in critical sectors such as government, healthcare, infrastructure, and financial services, ensuring they maintain robust cybersecurity practices. Moreover, its user-friendly approach enhances the overall efficiency of compliance efforts across different organizational environments.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CYRISMA
Founded
2018
Country
United States
Website
cyrisma.com
Vendor Details
Company Name
Huntsman Security
Founded
1999
Country
Australia
Website
huntsmansecurity.com/products/essential-8-auditor/
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning