T-Rex Security Dashboard Product Overview

T-Rex Security Dashboard Product Overview

Date: March 20, 2020
Tags: , , , , , , , ,

Engineers and managers need an unobstructed view of security operational controls to manage their organization’s security infrastructure. The T-Rex Security Dashboard seamlessly integrates all security tools and processes into a single view that provides managers with analytical data and a dashboard view of security operational controls.

The constant growth of technology has made security management a complex task. Traditional approaches to security such as manual change processes and monolithic policies are no longer enough. A more agile approach is required in order to properly manage the security infrastructure.

Before installing a new software program on a customer network, that program needs to be introduced and tested in a protected environment that won’t compromise the entire customer network. In government IT, this requires an authorization to operate or ATO. The T-Rex Security Dashboard allows for the tracking of ATOs, POAMS, and other security tasks in a common way and ensures consistency in work products and processes.

T-Rex’s Security Dashboard and tracking of ATOs ties closely to the decision-making process we use when working with a customer to evaluate each of their applications for modernization. This evaluation process results in decisions to: Relocate, Rehost, Replatform, Repurchase, Refactor, Retain or possibly Retire a customer application. These “7Rs” allow for the categorization of customer applications, commonly referred to as Application Rationalization, and ultimately determines what components need to be approved for use by the organization. The use of the T-Rex Security Dashboard facilitates the Application Rationalization process and highlights when organizations are on track to securely deploy an application.

The T-Rex Security Dashboard takes an agile approach to displaying the current state of all applications and components from a security standpoint, clearly identifies items trending late, and highlights those tasks that are blocked. Customers can track progress toward completion of their technology transition and identify which applications require further evaluation. The Dashboard is a perfect tool to single out activities that are overdue or approaching delays.

To find out more about the T-Rex Security Dashboard, contact us at info@trexsolutionsllc.com.

You may also wish to read our recent article announcing T-Rex SMILE® and the supporting Centers of Excellence Framework.


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]