Security News > 2020 > October > Virtustream launches unified, security and compliance management platform
Virtustream announced xStreamCare Services for Security and Compliance, bringing together advanced security management and monitoring, expert consulting services, and its innovative Trust Platform - a unified, security and compliance management platform.
Virtustream's latest security solutions provide near real-time visibility into security alerts, intrusion attempts, open vulnerabilities, log analytics, policy management and entitlements across Virtustream's Enterprise Cloud and Healthcare Cloud platforms, enabling enterprises to achieve a more proactive security posture to protect their business' IT assets, applications and data.
"Our comprehensive approach to security is built on more than a decade of mission-critical cloud experience. With our new security offerings, you can eliminate the need to internally manage the growing number of complexities, cyberattacks and regulatory requirements," says Pritesh Parekh, Chief Trust & Security Officer at Virtustream.
"Our xStreamCare Services for Security and Compliance allow our customers to attain a more robust proactive security posture with unified, near real-time visibility, enabling them to quickly set priorities and make more informed security decisions with precision."
Compliance reporting: Allows on-demand download of available reports such as Type 2 SOC 2 + HITRUST with Cloud Security Alliance Cloud Controls Matrix and Type 2 Attestation HIPAA/HITECH. Asset management dashboard: Catalogs all assets in the cloud along with the status of security services.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/DxaLrlUTFu8/
Related news
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- Setting a security standard: From vulnerability to exposure management (source)
- CISOs in 2025: Balancing security, compliance, and accountability (source)
- Navigating the compliance labyrinth: A CSO’s guide to scaling security (source)
- The effect of compliance requirements on vulnerability management strategies (source)
- Key steps to scaling automated compliance while maintaining security (source)