Deprecated: Function get_magic_quotes_gpc() is deprecated in /home/customer/www/ on line 153

Deprecated: Function create_function() is deprecated in /home/customer/www/ on line 49
Picture this – Continuous Monitoring, 360 degrees of answers - Diligent eSecurity
  • Government Agencies

    Cyber attacks against government information systems have become more frequent and sophisticated in complexity. Diligent eSecurity provides cost effective solutions to help agencies protect against these types of attacks.

    Read More

    Government Agencies
  • Healthcare & BioPharma

    Today’s Healthcare CIO struggles to meet HIPAA’s Meaningful Use requirements. At Diligent eSecurity, we believe that complying with HIPAA’s Meaningful Use core requirement (#15, conduct a security risk analysis) is only the first step to securing your healthcare facility and patient’s personal information assets.

    Read More

    Healthcare & BioPharma
  • Government
  • Healthcare & BioPharma
Why Choose Diligent?
  • Conducts 100% of the IT risk assessments for the world’s largest healthcare provider
  • 100% of our revenue come from client referrals
  • Maintains client retention rate of over 95%
  • Created a risk assessment methodology that has been adopted by three federal agencies as their standard.

Learn more about how we can help you

Give us a call on 1 678 393 8173

Contact Us Today

Picture this – Continuous Monitoring, 360 degrees of answers

Friday, 06 December 2013

There are distinct benefits to implementing an Automated Continuous Monitoring solution (see “Continuous Monitoring surpasses Compliance Management in Effectiveness”) over the traditional approach to compliance management. But what does an Automated Continuous Monitoring solution look like?


pic 1


Today, organizations manage their information security compliance and risk in static, disparate silos: 

Every industry has Compliance Mandates such as NIST, FISMA, PCI, DIACAP, SOX, SOC2, HIPAA, and NERC CIP which drive their Corporate Information Security Policies. These policies are captured in binders that largely remain static. 

During the course of their risk assessment process, they conduct a Business Impact Analysis to determine the risk associated with each information system. 

This information is not usually correlated to the Compliance Mandates and Corporate Information Security Policies

Security Information and Event Management (SIEM) systems and loggers monitor information systems using definitions of known threats to identify vulnerable systems. These tools can be augmented by input from the National Vulnerability Database which tracks all known threats. 

There is typically not an automated way in which to analyze the data from these tools in the context of the Corporate Information Security policies which creates the opportunity for non-compliance. 

Adding to the complexity is the need to make updates to software and hardware firmware. These updates are cataloged in Configuration Management tools that are very rarely connected to the SIEM Tools and Vulnerabilities and Threat Database thereby leaving another place for non-compliance to creep in. 

Traditional “continuous monitoring” depends upon processes and human effort to keep pace with the rapid changes in Compliance Mandates, Corporate Information Security Policies, Threats and Vulnerabilities and Information System updates in order to maintain compliance. 

All hope is not lost. Automated Continuous Monitoring provides a solution: An integrated, automated web of process, information and control. 

pic 2


No matter where you start, an effective automated continuous monitoring solution that enables an enterprise to have a 360⁰ view of their risk should have the following capabilities:

$       ·      Ingest information from sensors and security incident event monitoring (SIEM) tools to analyze security vulnerabilities and provide a risk score based on customer defined scoring metrics. 

          ·     Map known vulnerabilities against compliance guidelines such as NERC CIP, HIPAA, PHI, PCI, FISMA, NIST, GLB, DIACAP, SOC and SOX. 

$        ·     Automate updates to compliance guidelines and documents.

$        ·     Monitor configuration management changes to identify the introduction of new security vulnerabilities.

$        ·     Automatically document system changes and include in system security reports.

$        ·     Natively discover network assets and the associated security vulnerabilities with    the use of WMI and SNMP scans. 

$        ·     Validate that systems are compliant with latest operating environment versions and anti-virus dates.

$        ·     Manage the generation of reports associated with security guideline compliance into appropriate formats for NERC CIP, HIPAA, PHI, PCI, FISMA, NIST, GLB, DIACAP, SOC, and SOX.                 

$        ·     Capable of ingesting SCAP related data (ASR, ARF and other XML), process that information, and provide a Risk Score.   

$        ·     Collaboration tool for the facilitation of the Certification & Accreditation and Assessment & Authorization process.

 ·       ·      Receive Common Vulnerabilities and Exposures (CVE) input from the National Vulnerability Database (NVD).      

Having a 360 degree view completes the picture for security enterprise risk management.  No matter where you look, you have deep insights and actionable intelligence. Worries of dated information are eliminated and you are presented with actionable data.

That’s a rosy picture, I’d say.

pic 3

 By integrating all this information, the solution can provide a real-time comprehensive risk profile for the organization so that you can determine the following:

    ·    The risk associated with a change to an information security guideline or corporate security policy.             

·     The risk associated with an update to an operating system or anti-virus definition that has not yet been applied to your system.

·     The risk associated with a system configuration change.

 ·     The risk associated with a boundary protection device or application that is out of service.

 ·     The risk associated with a new threat appearing in the NVD.

Governance, risk, and compliance management is poised to move to the next phase of its evolution with Automated Continuous Monitoring. Products are being introduced into the market. Now is the time to think about the benefits that your enterprise can garner by implementing a solution.

- Gerry Baron, MBA 

VP Business Development at Diligent eSecurity International

 To find out how Diligent eSecurity can help your company Implement Automated Continuous Monitoring and secure your information assets, email This email address is being protected from spambots. You need JavaScript enabled to view it. or call +1 678-393-8173.









Comments (0)

Leave a comment

You are commenting as guest.

Recent Blog Posts and Press Releases

  • We are very pleased with your organization’s performance and service. Your staff is friendly, responsive, courteous and professional.

    - USAID client

Our Clients Include

  • Grace Kennedy Limited
  • Healthways
  • Jamaica Institute of Bankers
  • Lascelles deMarcado
  • McLeod Health
  • Northrup Grumman

About Us


Contact Us

1954 Airport Road

Suite 233

Atlanta, GA 30341


Tel: +1 678-393-8173


This email address is being protected from spambots. You need JavaScript enabled to view it.

Connect With Us


Copyright © Diligent eSecurity Intl.

Designed by One Great Studio