Over the past few years, numerous technologies have surfaced within the information security space that assist enterprises and auditors with identifying security problems using vulnerability scanners, application security scanners, antivirus solutions, firewall analyzers and solutions that monitor for data breaches. All these solutions rely on the concept of “vulnerability signatures” for identification of security problems.
ControlCase has taken the concept of "vulnerability signatures" and abstracted and applied it at a higher level of Compliance through the pioneering concept of "Compliance Signatures".
Compliance Signatures allow various low level security, vulnerability, configuration/setting and operational data to be aggregated and mapped to a particular standard, compliance section or control framework. This significantly reduces the amount of effort needed to collect and correlate various data from various sources to determine the level of compliance.