Skip to end of metadata
Go to start of metadata

The objective of this module is to bridge the gap between the requirements of the information security management and the EAM data. Define requirements, map them to the EAM data and perform target-to-target comparison with automated workflows to detect deviations (risks) and do subsequent risk assessment. In addition, actions to correct these deviations can be defined and tracked.

This module is licensed separately and requires a specific license key.

  • No labels