Sunnyvale, Calif. & Albuquerque, N.M. – August 26, 2016 – RiskSense® Inc., the pioneer and market leader in pro-active cyber risk management, today announced that the company’s cyber risk management platform was selected Best Cyber Risk Management Software of 2016 in the 8th Annual Security Products Magazine New Product of the Year Awards. The RiskSense Platform was recognized for its innovations in intelligence-driven cyber risk analytics, which identify threats in near real-time based on business risk criticality across the entire attack surface of an organization, and prioritize closed-loop remediation efforts.
The 2016 Security Products New Product of the Year Awards, which received a record number of entrants this year, are judged by an independent panel of security experts and honor security vendor products that are new and noteworthy in their ability to improve security. Winners will be featured in the December issue of the magazine.
“RiskSense is honored to have been named Best Cyber Risk Management Software of 2016 in the Security Products New Product of the Year Awards,” said Torsten George, vice president of global marketing and products at RiskSense. “Even mid-sized organizations are dealing with thousands of vulnerabilities across an increasingly de-perimeterized attack surface that spans network, Web applications, cloud services, mobile devices, and the Internet of Things. RiskSense streamlines the cyber risk management process so that organizations can focus on prioritizing and remediating the most critical security vulnerabilities.”
The RiskSense cyber risk management platform uniquely extracts actionable intelligence from the massive volume of data generated by the patchwork of cyber security products, including vulnerability scanners, threat intelligence feeds, and other complex security systems. This allows organizations to quickly understand their particular cyber risk exposure across a growing attack surface, quickly orchestrate remediation, and monitor the results. This next-gen approach takes them from detection to remediation in minutes versus months, by unifying and contextualizing internal security intelligence, external threat data, and business criticality.