Companies can only protect their critical assets through effective planning, which combine custom requirements tied to their own business priorities, as well as compliance with regulations and standards. Effective policies address comprehensive risks; ensuring those policies are implemented across the enterprise can often be the hard part.

The offerings recognized in this category measure, analyze and report risk, as well as enforce and update configuration policies within the enterprise, including but not limited to network, encryption, software, and hardware devices.

FINALIST | BEST RISK/POLICY MANAGEMENT SOLUTION

COWBELL PRIME 250
Company: Cowbell Cyber
Noteworthy: Continuously updating by compiling Cowbell Factors: a set of risk rating factors that assess an organization’s cyber risk in real-time along several factors, automatically matching to the most relevant coverage for the business.

FINALIST | BEST RISK/POLICY MANAGEMENT SOLUTION

CYBER RISK GRAPH
Company: Brinqa
Noteworthy: The solution is a literal graph that connects all relevant business, security and IT data and processes, ensuring that any information that is relevant to risk analysis — regardless of where it exists in the organization — is referenced, accessed and incorporated.

FINALIST | BEST RISK/POLICY MANAGEMENT SOLUTION

FIREMOM RISK ANALYZER
Company: FireMon
Noteworthy: Enables security engineers to manage risk across cloud, datacenter, and hybrid networks through a single unified interface, supporting changes to thousands of heterogeneous devices and cloud instances simultaneously without slowing performance or ramping up staffing.

FINALIST | BEST RISK/POLICY MANAGEMENT SOLUTION

ONETRUST GRC
Company: OneTrust
Noteworthy: Integrated platform allows insights to be mapped and shared across risk domains to understand the inter-connectivity between risk and the impact that any risk, threat or vulnerability may present to an organization.

FINALIST | BEST RISK/POLICY MANAGEMENT SOLUTION

XACTA
Company: Telos Corporation
Noteworthy: Provides customers with the automation that is critical for gathering, organizing and operationalizing the data needed to continuously manage cyber risk for regulated and non-regulated industries alike, ultimately helping to accelerate cloud adoption.