Engineers and managers need an unobstructed view of security operational controls to manage their organization’s security infrastructure. The T-Rex Security Dashboard seamlessly integrates all security tools and processes into a single view that provides managers with analytical data and a dashboard view of security operational controls.
The constant growth of technology has made security management a complex task. Traditional approaches to security such as manual change processes and monolithic policies are no longer enough. A more agile approach is required in order to properly manage the security infrastructure.
Before installing a new software program on a customer network, that program needs to be introduced and tested in a protected environment that won’t compromise the entire customer network. In government IT, this requires an authorization to operate or ATO. The T-Rex Security Dashboard allows for the tracking of ATOs, POAMS, and other security tasks in a common way and ensures consistency in work products and processes.
T-Rex’s Security Dashboard and tracking of ATOs ties closely to the decision-making process we use when working with a customer to evaluate each of their applications for modernization. This evaluation process results in decisions to: Rehost, Replatform, Repurchase, Refactor, Retain or possibly Retire a customer application. These “6Rs” allow for the categorization of customer applications, commonly referred to as Application Rationalization, and ultimately determines what components need to be approved for use by the organization. The use of the T-Rex Security Dashboard facilitates the Application Rationalization process and highlights when organizations are on track to securely deploy an application.
The T-Rex Security Dashboard takes an agile approach to displaying the current state of all applications and components from a security standpoint, clearly identifies items trending late, and highlights those tasks that are blocked. Customers can track progress toward completion of their technology transition and identify which applications require further evaluation. The Dashboard is a perfect tool to single out activities that are overdue or approaching delays.
To find out more about the T-Rex Security Dashboard, contact us at firstname.lastname@example.org.
You may also wish to read our recent article announcing T-Rex SMILE and the supporting Centers of Excellence Framework.