Laserfiche WebLink
<br /> <br />TARGET, FOCUS AND JUSTIFY THE ENTIRE SECURITY BUDGET <br />WITH RISKWATCH@'S RETURN ON INVESTMENT (ROI) ANALYSIS <br /> <br />RiskWatch" foJlows thc GAO methodology in aJl <br />elements of its security risk assessment products. <br />"We huve previollsly reported 011 the )'a/lIe (~lll <br />flew approach l~rllsillg sound threat and ri.""h' <br />Wisessmcflts ... forfrn'lIsing programs ulld <br />investments to combat terrori.\'IIl. .. <br /> <br />According to a recent U.S. General Accounting <br />Office Report, " The approach to good securi(v is <br />fimdamentally similar regardless afthe assets <br />being protected ", As GA 0 has previously reported <br />for homeland security and information s.vstems <br />security. "applying risk management principles <br />can provide a sound foundation for effective <br />security whether the as!;ets are information, <br />operations, people. or facilities". These <br />principles, which have been followed by members <br />qfthe intelligence and defense community/or <br />many years. can be reduced tofive basic steps: <br /> <br />J. Jdent(fy Assets <br />2. Ident(f}' and characterize Threats <br />3. Ident(fy and characterize Vulnerabilities <br />4. Risk must be analyzed and assessed <br />5. Ident(f}' countermeasures to reduce risks <br /> <br />Risk W atchc< follows the GAO methodology and <br />ASIS best practices in all elements of its security <br />risk assessment products. <br /> <br />lurr'n~ "no Rc,'"",",~ .,~ cr'", <br /> <br /> <br />",,,",,,,"(", <br /> <br />]',,,,"'!' I.., (;"",,",,, <br /> <br />\,wlL,';"I.""" <br /> <br />s.~,","\' """H' 140" <br /> <br />I"L,"""I1I1<<,',,,,,,,,,,,,, <br /> <br />1'10:",,,,,,11,<,,,,",,1011" <br />]';,,'k.,~, (,,,",,,,II~ '" , <br /> <br />K""",""", <br /> <br />Mm <br />Ca,h <br /> <br />Llln <br /> <br />InliZ e a Ions IpS <br /> <br />Threat <br /> <br />Vulnerability <br /> <br />Direct Loss Accident , IConstruction 1 <br />/'" I Fines !~, Earthquake / / Barriers <br />1- - I Dl5r\Jpbon 81 Oil Spills 1(" ;"'IRestricted Areas <br />-... 1 Indirect Los:s 'f\\ Power Loss Y' Personnel ID <br />Intang,bl.. \\ Theft I \ Key Control, <br />Lo5S of Ufe ~ AoodlnQ ~. \. No Security Plan <br />Terrorist Attac~ Pumas Damaaed <br />Incident Class -.J Homicide \ \~Dockside <br />Incident I ~Construction <br />'---Degree of Seriousness <br />Conditioned Incident <br /> <br />Carrier <br />I Chemicals <br />Ca",o <br />c~w <br /> <br />Security <br />Personnel <br /> <br />1 D_p .db\;j~R <br /> <br />The R;skWatch engine automatically links and analyzes the relationships <br />between each element of the assessment including threats and controls <br /> <br />EASY TO USE <br />RiskWaIch for Physical & <br />Homeland SecurityBl is shipped <br />overnight to your location and you <br />can start your assessment the very <br />next day! <br /> <br />FREE TRAINING <br />A two-day class for one person at <br />Risk Watchj{; headquarters in <br />Annapolis, Maryland is included <br />at no cost with your software, <br />You can also purchase onMline or <br />on-site training. <br /> <br />WRITES THE REPORT FOR <br />YOU IN MOST WORD <br />PROCESSING PROGRAMS <br />RiskWatch for Physical & <br />Homeland Security ™ writes a <br />complete I OOMpage report that can <br />be fully customized by the analyst. <br />It includes a 3-page Executive <br /> <br />Summary, a 17-page Technical <br />Report, full definitions, a security <br />requirements library, and a <br />Project Plan/Data Collection kit. <br /> <br />INCLUDES AUDIT TRAILS <br />The report includes complete <br />audit trails to validate your results <br />and find out who answered every <br />question and what their answers <br />were. <br /> <br />ADD PICTURES OR <br />ORGANlZA TlONAL CHARTS <br />QUICKL Y & EASIL Y <br /> <br /> <br />; RISK <br />hWATCH <br /> <br />RiskWatch@develops the world's leading security risk assessment software. RiskWatch@ software <br />meels all federal and audit standards for risk assessment. RiskWatch@c1ients include the US Department <br />of Defense, the US Department of Justice, the National Research Council of Canada. the US Coast <br />Guard, the National Security Agency, the Pentagon Force Protection Agency, state governments in all fifty <br />states, as well as major private companies like AT&T, Pinkertons. PDVSA. Verizon and Vodafone. <br /> <br />2004 Product Sheet RiskWatch@ Is a registered trademark of RlskWatch,lnc. <br />