top of page

01.

Holistic

Caveris ICAS approaches security management from a totally inclusive perspective, orchestrating the execution and tracking of manual attestation tasks and automated technology assurance checks across the entire organisation.

 

Caveris ICAS provides businesses with a truly representative view of their Cybersecurity, so they can base their Cyber-risk decisions upon the full picture.

01.

Caveris

Information Secured Assured

Avenir Light is a clean and stylish font favored by designers. It's easy on the eyes and a great go to font for titles, paragraphs & more.

Caveris Approach

"Security management is a holistic undertaking, comprising people, process and technology. It is debatable that technology alone can provide any protection at all if not actively backed up by effective security process."

How Caveris ICAS works

"Without structure and order the enforcement of security can only ever be haphazard at best."

02.

Structure and Order

Caveris ICAS brings structure, order and oversight to the management of Information Risk and Cybersecurity, resulting in the enforcement of a consistent, repeatable and predictable level of security across the entire enterprise.
 

Caveris ICAS achieves this by modelling in software the organisation hierarchy (i.e. creating a digital twin) from lines of business down to the individual security controls and their workflows. The ICAS Model provides the foundation for enforcing consistency, accountability and rigour.

02.

02.

Model the Organisation

Model the organisation structure that best represents your business using ICAS hierarchy objects.  This could be geographical or logical or a mixture of both, it’s what works best for you.

Step 01

Domain

Sub-Domain

Infrastructure

Manage Control Sets

Select the Control Sets most suited to your business needs from the ICAS Control Framework Library or build your own using the ICAS Control Builder.

 

Configure Control Owners and schedules for manual attestation Controls and apply Control Sets across Infrastructures.

 

In the case of automated technology check Controls, just enable the check, configure the frequency and bind it to the appropriate Control – it couldn’t be simpler.

Step 02

Setting up ICAS is easy, a few hours is all it takes!

​You are now up and running.

You can now see where there are weaknesses in your Cybersecurity controls so that you can address deficiencies and gaps accordingly.

Take targeted action

03.

Control Execution

The Caveris ICAS orchestration engine schedules and runs manual attestation Controls, re-notifying Control Owners or escalating if necessary to ensure that Controls are addressed and not left undone or incomplete. Automated checks are executed on the frequency configured and the associated Controls updated with the results accordingly.

03.

04.

Control Assessment

Caveris ICAS assesses the performance of all Controls, taking into consideration current completion status and those of previous runs, to calculate an individual score for each.

These scores are propagated up through the modelled hierarchy in conjunction with a configurable set of weightings, that are used to represent the businesses risk profile, to arrive at an overall Security Posture score, that shows you how well your protection measures are being applied.

04.

04.

Leave nothing to chance

bottom of page