INFOSYNC

Gartner, a leading company in strategic consulting, research and analysis in the field of Information Technology has included the Infosync platform among the vendors analyzed in the report Gartner’s 2018 Critical Capabilities for IT Risk Management Solutions.

The inclusion of INFOSYNC in the Gartner 2018 report on ITRM Critical Capabilities, in continuity with the Notable Mention received in the 2017 Magic Quadrant for IT RM, is an important recognition of the Infosync solution growth path for IT Risk Management in these years, and rewards constant attention to market and regulatory developments, and to the functional needs of customers by the ESC2 team.

In particular, as described in the Gartner report, we have made the Cloud version available with fee in SaaS for customers who prefer activation agility and a model with OPEX costs including maintenance to the purchase of a perpetual license and annual maintenance , and that they do not need the “On Premises” solution. We have also released the advanced reporting module based on Tableau with many templates immediately available and customizable, making the entire strategic reporting cycle much faster and more responsive to our customers’ needs. “I believe there is a large market space for the INFOSYNC solution both in Italy, the country where we are the only vendor that has its head office, and in Europe. ”  Claudio Ragno after the publication of the report on August 20, 2018.

ABOUT GARTNER

Gartner is the world’s leading research and consulting company that is considered an objective resource and a critical partner from over 12,000 organizations in over 100 countries. According to John Wheeler, Gartner’s IRM research director, Integrated Risk Management is “the largest security and risk management software market covered by Gartner”, as this report is the main source of market information used by thousands of executives working in the field of security and global risks.

Gartner does not endorse any supplier, product or service depicted in its research publications and does not advise technology users to select only those suppliers with the highest scores or other designations. Gartner research publications consist of the opinions of the Gartner research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, in connection with this research, including any warranties of merchantability or fitness for a particular purpose.

LOGO INFOSYNC ESC2

INTEGRATED Risk Management Platform

Infosync is the innovative ESC 2 tool that aims to assist through the phases of IR Risk assessment and management.

It’s able to integrate a complete and representative set of risk scenarios through a holistic model, which the company is subject to, by the nature of the activities aimed at establishing the value and attaining the mission of the company. Specifically, it integrates IT risk scenarios with security scenarios.

The technological risk assessments are also subordinated to the internal control and monitoring model, implemented through the Control Plans, and the process of managing potential and historical incidents.

SUMMARY AND REPRESENTATION OF THE STATE OF IT RISK AND SECURITY

Collection and automatic processing of information, according to schemes and models of integration.

Evidence of the most critical areas, with regard to the impact of possible security events, in order to identify the best IT risk management and treatment strategies.

CENTRALIZATION OF DECISION MAKING AND REMEDIATION PLANS

Support for strategy and IT security planning, reducing efforts, time and resources used to improve the level of security and maturity of the organization.

MONITORING OF THE EFFECTIVENESS OF THE IMPLEMENTED SOLUTIONS

Monitoring of IT security status through the Security Key Perfomance Indicator and Key Risk Indicator of possible security events, in order to identify the best IT risk management and treatment strategies.

SHARED INFORMATION

Hub ITRM: profiled information sharing through a virtuous input-output scheme to and from IT systems and IT Security processes.