T-Rex Security Dashboard Product Overview

T-Rex Security Dashboard Product Overview

Date: March 20, 2020
Tags: , , , , , , , ,

Engineers and managers need an unobstructed view of security operational controls to manage their organization’s security infrastructure. The T-Rex Security Dashboard seamlessly integrates all security tools and processes into a single view that provides managers with analytical data and a dashboard view of security operational controls.

The constant growth of technology has made security management a complex task. Traditional approaches to security such as manual change processes and monolithic policies are no longer enough. A more agile approach is required in order to properly manage the security infrastructure.

Before installing a new software program on a customer network, that program needs to be introduced and tested in a protected environment that won’t compromise the entire customer network. In government IT, this requires an authorization to operate or ATO. The T-Rex Security Dashboard allows for the tracking of ATOs, POAMS, and other security tasks in a common way and ensures consistency in work products and processes.

T-Rex’s Security Dashboard and tracking of ATOs ties closely to the decision-making process we use when working with a customer to evaluate each of their applications for modernization. This evaluation process results in decisions to: Relocate, Rehost, Replatform, Repurchase, Refactor, Retain or possibly Retire a customer application. These “7Rs” allow for the categorization of customer applications, commonly referred to as Application Rationalization, and ultimately determines what components need to be approved for use by the organization. The use of the T-Rex Security Dashboard facilitates the Application Rationalization process and highlights when organizations are on track to securely deploy an application.

The T-Rex Security Dashboard takes an agile approach to displaying the current state of all applications and components from a security standpoint, clearly identifies items trending late, and highlights those tasks that are blocked. Customers can track progress toward completion of their technology transition and identify which applications require further evaluation. The Dashboard is a perfect tool to single out activities that are overdue or approaching delays.

To find out more about the T-Rex Security Dashboard, contact us at info@trexsolutionsllc.com.

You may also wish to read our recent article announcing T-Rex SMILE® and the supporting Centers of Excellence Framework.


recently posted
DataOps: Toward an Incremental Data Process

DataOps: Toward an Incremental Data Process

Data science projects are known to have a high failure rate of up to 85% despite the nature of their important role to business. Integrating data analytics into core Information Technology (IT) capabilities can be elusive and daunting. “If we […]

FinOps: Modernizing Cost Planning and Management in Hybrid IT Environments

FinOps: Modernizing Cost Planning and Management in Hybrid IT Environments

According to the latest forecast from Gartner, Inc Worldwide, end-user spending on public cloud services is forecast to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion in 2020. While cloud spending is increasing at a rapid […]

What is Zero Trust and Why Do I Need It?

What is Zero Trust and Why Do I Need It?

The traditional approach to cybersecurity, known as perimeter and defense in depth models, are not enough. Bad actors continue to evolve their methods of attack to access an organization’s most mission critical systems. How can your business withstand a cyber-attack?

How to modernize to the cloud: A Census Case History

How to modernize to the cloud: A Census Case History

The 2020 Census went online for the first time ever without a single second of downtime and zero hacks. T-Rex helped contribute to this success as the Technical Integrator. T-Rex’s Chief Technology & Innovation Officer Jason Keplinger and Chief Engineer […]