A risk-based approach to securing the cyber ecosystem.

The Cyber Threat Landscape

As business and organizations increasingly rely on information technology and cyber operations, they are also challenged with securing their critical data and operations from tampering, exposure and/or disruption, all of which impact business continuity and revenue. The dynamic nature of the cyber threat landscape requires continuous prevention, detection and remediation for changes in networks, systems, policies and software which can expose the business to cyber-attacks.

Existing security solutions which prevent, detect, and remediate security events operate on network, device and system level information but are often siloed and disconnected from the business risks of these security alerts and incidents. As a result, cyber security and response teams are often inundated with noisy, low impact security alerts and spend exhaustive efforts chasing down events which have nominal business impact. Greenlight’s Security Risk Analytics solution is designed to work with existing security solutions to correlate the business risk to security events and alerts in order to provide streamlined, effective management of threats and improve cyber security posture.

Greenlight Security Risk Analytics leverages data from multiple sources and analyzes asset, network, business function and risk intelligence with security, compliance and incident data. The solution offers an integrated view of the business manifestation of risks due to failures or violations in security, compliance, and incident management, enabling actionable insight to enforce a defensible and resilient cyber posture. The integrated solution provides situational awareness on multiple fronts – risk, threat, compliance, incident from a single pane. Aggregation of compliance, risk, threat, and incident data in a single solution also enables real-time, flexible board room reporting of key performance indicators.

Security Risk Analytics

RiskAnalyticsGreenlight’s risk-based approach to securing the cyber ecosystem provides a business level view on the who, what, where and when of cyber events. Greenlight Security Risk Analytics performs real-time, continuous residual risk assessment leveraging risk indicators correlated with compliance failures, internally detected security events on critical assets, external threat intelligence feeds asset vulnerability ratings as well as incident management KPIs.

Risks are also assessed across multiple business hierarchies including business process, line of business or a product/service. Quantification of risks, indicators, drivers, and impact allow predictive risk analysis to identify potential impacted processes and services. This enables board room reporting cyber posture on information leakage, service degradation and disruption, data tampering, and other risks from the business operations perspective.

Compliance Monitoring

ComplianceMonitoringThe Greenlight solution facilitates the intake of requirements, content analytics, applicability analysis, impact assessment and collaboration among key stakeholders in order to ensure requirements are understood, risks are identified, assessed, and controls are implemented and subsequently monitored for effectiveness. Greenlight continuously monitors IT controls in order to perform gap analysis and track compliance with external regulations, standards, frameworks and requirements and well as internal security initiatives.

Compliance measures correlate control data to business groups, functions and operations, providing context to ensure control violations and related risks are managed appropriately. Compliance failures showing lack of baseline security readiness are shown as risks in the integrated risk view for the executives to escalate compliance programs and communication.

Risk-Based Threat Management

The Greenlight Solution aggregates data from security prevention, detection andRiskBasedThreatManagement remediation platforms and correlates that data with cyber risk, business operation and asset criticality. Threat levels are continuously calculated at the business process and operations level to provide an actionable scoring on current security alerts and related vulnerable assets. Greenlight also analyzes security along with compliance data to discover anomalous user behaviors and insider threat indicators.

Greenlight’s risk-based approach empowers management to quickly identify those security events with the most business impact in order to direct personnel and efforts where is it most needed. The streamlined threat management process also enables security analysts to effectively triage and prioritize security alerts to investigate and remediate before those alert events manifest into a real cyber-attack or data breach.

Incident Management

IncidentManagementGreenlight measures and correlates an organization’s response and remediation to events which relate to its cyber security posture whether it is a control exception, a security alert or a cyber-attack incident. By tracking key performance indicators, Greenlight provides insight into how rapidly and effectively control violations are closed, security alerts are resolved and security incidents are addressed in order to mitigate risk. How well business entities resolve and recover from compliance failures, security breaches and potential threats also factor into the dynamic risk assessment.

Use Cases

  • Integration with SIEM tools: Security alerts data from SIEM solutions can be enriched with asset and risk data to enable contextual alert triaging, threat level calculations and drive risk assessments.

  • Integration with Security Research/ Threat Analysis as one of the sources of information to get real-time threat intelligence feeds into Greenlight solution to show impact of compliance failures and correlate with risk based threat management within Greenlight

  • Integration with Greenlight application controls for ERP systems to prevent sensitive transactions from infected terminals and user ID identified by SIEM and IDS tools


View the on-demand webinar: How Does Your Cyber Posture Compare?