D3 Security Management Systems

D3 Security Management Systems
D3 Security Management Systems, Inc.
Type Private
Industry Software; Software as a service; Security management; Governance, risk management, and compliance
Genre Software development
Founded 2002
Founder(s) Gordon Benoit
Headquarters Oakville, ON
Number of locations Ontario, British Columbia, Maryland
Area served Global
Products Case Collaboration Platform, virtual Security Operations Center, Enterprise Security Management
Employees 40
Website [1]

D3 Security Management Systems, Inc., a privately held company headquartered in Oakville, Ontario, is a developer of software for Security, Governance, Risk Management, and Compliance functions of organizations.[1] The company operates as an enterprise on-site and software as a service provider with products designed for investigative case management, incident management, computer-assisted dispatch, security guard tour and security post orders.[2][3] Through its partnerships, D3 Security Management Systems receives affiliate revenue from other cloud computing partners and value-added resellers for windows mobile devices.

Contents

History

D3 Security Management Systems was formed in 2002 by Canadian entrepreneur Gordon Benoit. The original incident management software focused on delivering a configurable platform for automating the business processes of the physical security function.

In 2004 D3 Security Management Systems, leveraging a common thin client architecture and back-end framework, developed modules for computer-assisted dispatch and security guard tour. Following their release and implementation in early 2005, D3 Security Management Systems added a security post orders module. Beginning in 2006, D3 Security Management Systems implemented enhancements for more robust role-based access controls and transactional sharing of database records. The former permitted compliance with need to know regulations for privacy and the later enabled collaboration between functional units. As a result, D3 Security Management Systems released its Case Collaboration Platform (CCP), a configurable platform catering to the governance, risk management, and compliance business functions, expanding product scope from corporate security and physical security incident management to ethics and compliance, human resources and IT security case management.

Cloud Computing Security

As a software as a service provider, D3 Security Management Systems was an early adopter of solutions designed to secure the cloud. Using its published application programming interface for interaction with technology designed to extend single sign-on to the cloud, D3 Security Management Systems enabled single sign-on without inserting a third-party security product into its proprietary platform.[4]

See also

References

  1. ^ Brown, Jennifer (2008-03-05). "What's at risk? B.C. Hydro Puts Threat Risk Assessment Software to the Test". canadiansecuritymag.com. CLB Media and clbmedia.ca. http://www.canadiansecuritymag.com/Editorial/What-s-at-risk.html. Retrieved 2009-06-09. [dead link]
  2. ^ Curran, Rod (2009-05-01). "Laurier Special Constable Service: Year in Review, May 2008 - April 2009". wlu.ca. Wilfrid Laurier University. http://www.wlu.ca/documents/35774/Annual_Report_2008-09_pdf_version.pdf. Retrieved 2009-06-09. 
  3. ^ Heiser and De Lotto, Jay and Richard J. (2007-04-18). "Introduction to Investigative Case Management Products". gartner.com. Gartner, Inc. http://www.gartner.com/resources/147600/147654/introduction_to_investigativ_147654.pdf. Retrieved 2009-06-09. 
  4. ^ Horwitt, Elisabeth (2010-02-02). "How to fix cloud security". techworld.com. IDG and computerworld.com. http://howto.techworld.com/security/3211734/how-to-fix-cloud-security/. Retrieved 2010-02-24. 

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Security management — is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization s information assets and the development, documentation and implementation of… …   Wikipedia

  • ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… …   Wikipedia

  • Comparison of relational database management systems — Programming language comparisons General comparison Basic syntax Basic instructions Arrays Associative arrays String operations …   Wikipedia

  • Federal Information Security Management Act of 2002 — The Federal Information Security Management Act of 2002 ( FISMA , usc|44|3541, et seq. ) is a United States federal law enacted in 2002 as Title III of the E Government Act of 2002 (USPL|107|347, USStat|116|2899). The act was meant to bolster… …   Wikipedia

  • Sterling Management Systems — Infobox Company company name = Sterling Management Systems, a dba of the Emery Wilson Corp. [Fictitious Business Name Statement first published in Daily Commerce, Los Angeles on 1/14/94 File No. 94 58012] [… …   Wikipedia

  • Information Systems Security Management Professional — is a designation awarded by the International Information Systems Certification Consortium ((ISC)^2).For experienced information security professionals with an International Information Systems Security Certification Consortium ((ISC)2)… …   Wikipedia

  • Information security management system — An Information Security Management System (ISMS) is, as the name suggests, a set of policies concerned with information security management. The idiom arises primarily out of ISO/IEC 27001.The key concept of ISMS is for an organization to design …   Wikipedia

  • Aetos Security Management — The Aetos Security Management Private Limited, is one of the five commercial Auxiliary Police forces authorised to provide armed security officers in Singapore to government organisations as well as private companies. A fully owned subsidiary of… …   Wikipedia

  • NHS Counter Fraud and Security Management Service Division — The Counter Fraud and Security Management Division protects the staff, assets and resources of the National Health Service in England and Wales. Since 1 April 2006 it has been a division of the NHS Business Services Authority, a special health… …   Wikipedia

  • NHS Counter Fraud and Security Management Service — The NHS Counter Fraud and Security Management Service (NHS CFSMS) is the organisation with the remit to protect the staff, assets and resources of the NHS in England and Wales. Since the 1st of April 2006 it has been a division of the NHS… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”