DIRECTLY ALIGNED TO THE SRM BODY OF KNOWLEDGE

...SECTARA makes security risk management (SRM) simple, precise and accessible to all practitioners

TRY OUR FREE PLAN

SECTARA security software is an encrypted, highly collaborative system that assures methodological rigour in risk assessments and delivers enormous productivity benefits to security risk assessors.

Productivity gains through faster risk assessments

  • Create, review and edit all your risk assessments in much less time
  • Quickly manage your security assessments (and great library content).
  • Automate asset, threat and risk control integration within Risk Registers.

Tailored to your business & scalable

  • Add to default content and criteria within your growing data library.
  • SECTARA is highly scalable for use by any sized organisation.
  • Any scope / industry, SECTARA is globally applicable.

Collaborative and easy to use security software

  • Monitor and review risk assessments at all stages of development.
  • Conduct powerful security debriefs and step audiences through assessment logic.
  • Export risk assessment and treatment plans in MS Word/Excel at any stage.

Advanced & intuitive risk assessments

  • Enjoy stunning, logical user interfaces.
  • Designed to surpass the requirements of all major risk standards.
  • Detailed analytics to illustrate individual risk assessment results.

Highly secure & fully encrypted software

  • All sensitive security data is encrypted, meaning no admin or dev access.
  • Hosted within AWS and accredited by the Australian Government.
  • Five user types for complete control over who does / sees what.

Demonstrated value for you & your stakeholders

  • Deliver security debriefs using highly visual, interactive dashboards.
  • Employ system simplicity to educate and convince stakeholders.
  • Clearly demonstrate security best-practice for the regulatory process.

Step-by-Step Assessment process

Taking a security standards-based approach to security risk management means that some users will be familiar with the various elements involved in the process. Where SECTARA differs is how we’ve put them together, and how intuitive and agile each step in the assessment process is.

1

Configure A Risk Assessment

The first step is to set the risk assessment up, including assessor(s) & criteria.

2

Risk Assessment Context

The Assessor(s) then document Scope, Context & Criteria narrative.

3

Asset Assessment

An Asset Criticality Assessment is conducted, tailored to the scope.

4

Threat Assessment

Threat Actors & associated Threat Acts are documented, aligned to assets.

5

Risk Control Effectiveness

Risk controls & their effectiveness are defined & assessed.

6

Security Risk Register

An interactive, pre-populated Security Risk Register is completed.

7

Debrief in Analytics

Debrief stakeholders using logic, visual analytics and metrics.

8

Export & Treat

Export your assessment into MS Word/Excel & create a security treatment plan.