Follow on Google News News By Tag Industry News News By Location Country(s) Industry News
Follow on Google News | ![]() Tentacle Enhances Security Assessment Functionality By Adding Custom QuestionsCreate custom risk assessments by adding custom questions that address unique risks
By: Tentacle Tentacle's Additional Custom Questions feature enables users to customize an assessment by including user-created questions with one of Tentacle's standardized assessments aligned with major industry frameworks. Additional Custom Questions can be used to expand a standard assessment and to gain key data points not typically captured by today's framework controls. The new feature enables organizations to bring individualized detail to security assessments; "Effective end-to-end assessment management requires flexibility to support the unique needs of individual organizations, no matter their size. Our indexed industry frameworks are the critical foundation for assessing a security posture, and now, Additional Custom Questions provide an expanded layer of insight based on varying needs of assessors" says Matthew Combs, CEO at Tentacle. "We are focused on delivering that flexibility throughout our platform while also arming the market with a standardized level of invaluable awareness into their ecosystem for more comprehensive information security." Creation and management of Additional Custom Questions is available with Tentacle's Professional tier. To learn more about Tentacle, visit: www.tentacle.co About Tentacle: Tentacle is a SaaS information security platform located in Plano, TX. The company has developed a configurable data management tool that allows organizations to improve their information security programs and overall security posture. The core Tentacle product allows enterprises of all sizes to manage all details related to their internal security posture, track and monitor similar information for their partners and vendors, centralize the storage and management of all program related documentation, increase overall connectivity with key partners, establish multiple internal projects for tracking independent security requirements, and continually benchmark all activities against today's top industry frameworks governing the information security space. For more information: End
Page Updated Last on: Jul 19, 2022
|
|