www.obrela.com Swordfish Real Time Risk Management www.obrela.com 2 Real Time Risk Management OBRELA Security Industries leverages the SWORDFISH Technology to manage and protect its clients in real time. “SWORDFISH enables our clients to dynamically manage their security framework, enforce management, operational and technology security controls, assess compliance with regulations, policies and standards, and analyze our risks in real time. All under a single console.” Operational security requires a continuous process of awareness, preparedness and readiness; The Information Security Program. A highly demanding, cross-domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. Challenged by the complexity and cost of assembling security knowledge, which is fragmented, isolated and mostly static, organizations fail to comprehend the real tradeoffs against risk exposure. SWORDFISH Technology enables organizations to apply an organizational wide information security policy, orchestrating operational security activities and leveraging the knowledge from people, procedures and technology. The SWORDFISH open architecture, the integration capability and the potential to adapt to multiple security standards, regulations or frameworks, gives SWORDFISH the power to enforce organization-wide security models with diverse security requirements, technical infrastructures and risk profiles. SWORDFISH Technology enables businesses and organizations to take advantage of the unprecedented opportunities created by the “Internet of things” while mitigating risks. With SWORDFISH the most sophisticated, efficient, sustainable and agile security models can be realized, across-the-board compliance is achieved and, most important, the whole organization, not just parts of it, is engaged. www.obrela.com 3 The SWORDFISH Technology is capable to support and secure dependable infrastructures mainly through merging PEOPLE, PROCESS and TECHNOLOGY. Why SWORDFISH Designed as a platform to address different disciplines, security and organizational models, SWORDFISH does not aim to replace or compete with any existing product or technology; but rather it aims to integrate and centralize under a new holistic approach. SWORDFISH Technology is engineered to dynamically scale and adopt, providing with the necessary content, applications and gear (a) to plan, design, build and orchestrate Enterprise Information Security, (b) to integrate with subset security and business systems (c) to automate and streamline security procedures, (d) to consolidate, normalize and correlate information for assets, people and technology using the unified and structured SWORDFISH security ontology. At a glance SWORDFISH is not another GRC product or a new set of tools. It is a mindset shift. A shift in real time. A shift towards operational security. Document your Information Security Framework in a robust, secure and easy to use online environment Establish and implement an Enterprise Information Security Program Enforce your Information Security Framework through a powerful workflow engine Measure efficiency and effectiveness of security controls Assess information and operational risks in real time Assess, Manage and Demonstrate compliance Manage and track security assessments for your Vendors and your organization as well Assess exposure and rationalize your investments Plan mitigation actions and track remediation roadmaps regarding compliance gaps and vulnerabilities Assign security tasks to appropriate personnel, and automatically keep track of individual actions Develop Dashboards and create Reports tailored to your regulators and senior management needs www.obrela.com 4 The SWORDFISH Technology offers a modular architecture for tailoring information security frameworks, building new workflows and integrating with external data sources. The Swordfish Technology is engineered to be fully customizable in terms of user and group access privileges, aligned with both Corporate and Information Security roles and organizational structure as well. In effect, our solution addresses the business needs of the corresponding corporate audiences using the following modules: CISO Portal SWORDFISH serves as the single gateway to the security organization, allowing easy access to corporate policies and execution of security procedures through a centralized and access controlled intranet gateway. CISO portal is used as the central repository of information throughout the organization. Users can easily access security policies and standards (respecting the corporate classification scheme and the “need to know”), and can easily initiate procedures to complete their tasks. In addition, available questionnaires and security polls are very effective and can produce impressive results in terms of security training and awareness. Dynamic Workflow and Business Process Modeling Module The enterprise governance and compliance management capability of the Swordfish Technology smoothly connects all major elements of Information Security Management, from framework establishment and maintenance to continuous monitoring and reviewing. Using its powerful workflow engine clients can develop, define and streamline security procedures. SWORDFISH allows the allocation of tasks to security roles as well as end-users, and defines deadlines, priorities and escalation paths, based on corporate security requirements and regulations. Access Control An embedded classification scheme allows client organizations to restrict access to information based on the “need to know”. Access Control is enforced upon security roles and individual users as well, and the corresponding classification scheme is honored before access privileges are granted. Reports and Dashboards Powerful reporting functionality and dashboards are provided by default, but reports can also be developed dynamically by the reporting engine. Real time reports can be used to monitor the implementation of corporate security procedures by business units or third parties. Logging and Notifications An integrated logging and notification system provides detailed activity records that can be reviewed and audited on a regular or adhoc basis. Notifications can be designed and triggered according to corporate security procedures and can be sent via SMS or Email. Content Management Content that facilitates the development of new security policies or assists compliance with new regulations can be easily reused and tailored to your business requirements. A preloaded Content Library, which includes best-practice policies, control standards, control procedures, authoritative sources and assessment questions, is also provided. Document Management All documentation of the corporate Information Security Framework, including policies, standards and control procedures, is centrally managed. SWORDFISH also provides effective versioning control and document ownership management. Additionally, easy import and export of your content is supported. Asset Management Using the SWORDFISH Technology, all security related corporate assets can be centrally mapped in terms of location, owners, criticality and more. This allows effortless asset decomposition and supports the assessment of asset related risks. By employing the embedded asset decomposition functionality, assets can be decomposed to network or system elements creating a relative risk matrix, which can be leveraged to interconnect SWORDFISH with most modern SEM and SIM systems. It is then possible to respond on a real time basis to risks as soon as they occur. Vulnerability Management SWORDFISH Vulnerability Management (VMC) is a centralized security reporting web application environment, based on a customized information workflow, optimized for Penetration Testing and Vulnerability Assessment activity projects. On top of security reporting, SWORDFISH VMC offers a versatile customizable workspace, providing monitoring capabilities based on user defined parameters, allowing the visual presentation of report statistics, criticality, resolution status etc. according to the reported security findings. Collaboration www.obrela.com 5 The platform facilitates the design and development of Information Security Frameworks supported by embedded content and process models that vary depending on the industry sector as well as related standards and regulations. SWORDFISH functions as the Single Security Gateway for Operational Security. One through which everyone and everything can be managed, measured and monitored. Manage Compliance The implementation and monitoring of an Information Security Framework constitutes not only a business need but also a regulatory obligation for many organizations. Identifying such needs in the market, SWORDFISH assists businesses in demonstrating the compliance of their entire organization against internal security policies, international standards and government regulations, through audit questionnaires and procedure enforcement statistics. Our solution is able to compile real-time and ad-hoc reports for senior management, auditors and regulators. By leveraging the SWORDFISH capabilities, client organizations will be able to map policies and standards to their corporate objectives and regulative sources, such PCI, ISO/IEC, COBIT, HIPAA, SOX and privacy protection acts. Objectives and sources can be added over time as your business evolves and new regulations, best practices and internal requirements emerge. Procedures generate events that can be analyzed depending on their perceived gravity and the corresponding risk model. Risks can then be controlled, avoided, or accepted. In addition, the Swordfish Technology offers compliance management for external Vendors along with mitigation planning. The solution also provides real-time results and compliance reports designed for different audiences, including regulators and senior management. Manage Policy SWORDFIDH Technology enables organizations to consolidate information, orchestrate and streamline security activities across the Enterprise in order to reduce overheads, improve client operational security and rationalize security investments. With embedded content and a vast number of applications and connectors SWORDFISH enables organizations to dynamically manage their security framework, enforce management, operational and technology security controls, assess compliance with regulations, policies and standards, and analyze information risks in real time - all under a single interface carefully designed for ease of use. Automatic procedure monitoring supports the continuous internal auditing of the organization and provides essential information to decision makers regarding the enforcement of Information Security Frameworks. www.obrela.com 6 SWORDFISH as a Service (SaaS) helps you leverage SWORDFISH Technology without requiring capital expenditures in technology infrastructure or staff training. SWORDFISH as a Service (SaaS) helps you leverage SWORDFISH solutions without requiring capital expenditures in technology infrastructure or staff training. SWORDFISH services can be tailored to your information security model and integrated to your existing security organization and procedures. Key features: The look and feel can also be adjusted to address corporate branding and internal marketing requirements. SWORDFISH is also integrated with the Obrela Security Industries Corporate Security Intelligence Services and can be monitored on a real time basis leveraging existing Security Operations Centers and Infrastructure. SWORDFISH services can be tailored to your information security model and integrated to your existing security organization and procedures. • Unique Real Time Risk Management • Managed Content and Framework • Ongoing Risk Assessments • Managed Assurance – Regular Penetration Testing and Vulnerability Assessments through the vulnerability management console • Managed Compliance • Event Management • Integration with third party devices and applications • Realize lower Total Cost of Ownership (TCO), including zero capital expenditures . Address the root causes of vulnerable infrastructures rather than developing painkillers for the emerging security threats. www.obrela.com 7 Applying a horizontal enterprise-wide versus a vertical and typically technical security model SWORDFISH Technology can improve operational security in the following domains: Intelligence SWORDFISH process automation creates invaluable security related data and records we were never able to use before, which can now feed correlation engines and produce advanced intelligence and complete three dimensional enhanced security vision; Correlation of physical security with information security events, further, enable effective identification of asymmetric security attack patterns that combine property violation, bypassed procedures, fraud and computer security. Real Time Risk Management By using SWORDFISH organizations can now integrate real time intelligence and replace any static algorithms with real time data. Leveraging SWORDFISH organizations can now adopt dynamic security models that can prevent foreseen and emerging threats as well as provide the ground for effective response and threat containment. Risks can be measured, controlled, avoided or accepted. In real time. Centralization SWORDFISH functions as the Single Security Gateway for Operational Security. One through which everyone and everything can be managed, measured and monitored. Organizations can leverage SWORDFISH platform to design, implement, enforce and monitor operational security through a unified horizontal organizational workflow comprising vertical and horizontal security processes that are activated, sustained, or interrupted based on information provided from people, (other) processes and technology (systems). Automation With out of the box connectors and the ability to integrate with a vast number of security and business systems (external workflows, document management systems, ERPs, etc) SWORDFISH integrates people, process and technology and delivers 3D (three dimension) security as the substance of next generation information security. Automating procedures and integrating workflows unveils a unique potential for enterprise security, in terms of recording and monitoring previously invisible fragments of the security workflow. Integration with SIM and SEM SWORDFISH includes embedded connectors that communicate events to respective correlation engines. The SWORDFISH Technology supports special indexing and metadata formats in order to produce meaningful events that can be processed and analyzed using prioritization and correlation techniques. Events that reflect running procedures can be correlated with events that are created by systems, applications and networks, offering a unique ability to understand risk in real time. www.obrela.com Learn More http://www.obrela.com/SWORDFISH
© Copyright 2026 Paperzz