Company Overview of Relational Security Corporation
Relational Security Corporation, doing business as Rsam, develops and delivers governance, risk, and compliance (GRC) management software. It offers IT GRC, a GRC software that helps organizations and government agencies to identify, assess, manage, and mitigate risks. The company provides its solutions for audit, compliance, enterprise risk, exceptions, policy, incident, and vendor risk management; and issues and remediation tracking, and threat and vulnerability tracking. It also provides onsite and remote administrative training for customers; consulting services to assist customers in developing new and custom control libraries, streamlining existing assessment processes, deciding scorin...
700 Plaza Drive
Secaucus, NJ 07094
Founded in 2003
Key Executives for Relational Security Corporation
Chief Executive Officer and President
Founder and Chief Technology Officer
Managing Director of India and Senior Vice President of Engineering
Senior Director of Software Development
Compensation as of Fiscal Year 2015.
Relational Security Corporation Key Developments
Rsam Announces the Launch and Market Adoption of Rsam Security Risk Intelligence
Feb 20 14
Rsam announced the successful launch and market adoption of the company's solution for security operations big data - Rsam Security Risk Intelligence (SRI). Initially released in June 2013, SRI built upon Rsam's proven Threat and Vulnerability offering with the ability to analyze, normalize, correlate, add business relevance as well as create dashboards, reports and heat maps that let to communicate the key performance metrics of ongoing security program Big Data to the CSO. Rsam SRI has been successfully deployed by Rsam customers across vertical industries including healthcare, financial services, energy and retail, enabling them to automate processes, maintain compliance, gain insight into problematic areas and proactively take action before incidents occur. Highlights of Rsam Security Risk Intelligence (SRI) include: condense large volumes of data allowing to store metrics over many years without running out of space, metasploit data integration enables users to identify, then patch, those vulnerabilities that are most likely to be exploited. This rapid identification of 'low-hanging fruit' significantly reducing the likelihood of a breach, automated notification and prioritization allows teams to be laser-focused on the most relevant remediation efforts, proactive threat management that pulls data from the Common Vulnerabilities and Exposures (CVE) system and other threat intelligence feeds and routes them to the appropriate subject matter experts. Off-line decision support enhances collaboration and puts information in the hands of senior executives allowing them to make rapid decisions through their email without ever having to learn or navigate Rsam.
Similar Private Companies By Industry
Recent Private Companies Transactions
March 24, 2015
Most Searched Private Companies
Sponsored Financial Commentaries