BluePrint Protect™
Cybersecurity Risk Management Software Platform
Cybersecurity Risk Management Software Platform
BluePrint Protect™ drives task management and reporting to accelerate milestone completion, reducing the time and burden for all involved — especially your security team.
Visualization tools and dashboards provide a comprehensive, ongoing and dynamic view of enterprise-wide risks (internal or third-party).
Security team members, internal colleagues and third-parties can access or connect to the BluePrint Protect™ software platform to collaborate and communicate in real time.
Using Protect’s™ innovative third-party risk assessment platform, client stakeholders, assessors and third-party response teams collaborate in real-time to accomplish security program functions driven by pre-configured rules-based prompts, alerts and notifications. Protect’s™ proprietary Third-Party Risk Management assessment workflow provides transparency and real-time reporting of assessment status while enabling multi-user access and parallel-processing of risk assessments leading to 3x faster completion time on average. Protect™ helps manage third-party risk.
BluePrint Protect’s™ collaboration features allow for better task management and faster completion times by bringing platform users together in a shared worked space with a set of robust, easy to use tools. On-line, in-band-communication features and real time documentation tools allow users to work in parallel to efficiently complete their work.
Centralized communication on the platform happens with a robust set of easy-to-use tools. For instance, online chat features are used when assessors and third-party responders need to collaborate to complete an assessment. This eliminates a multitude of back-and-forth emails clogging up everyone’s inboxes through a log of all conversations which are easily referenced and have context. Information and documents can be posted and uploaded to be accessed and shared as and when needed.
Another key feature informed by our security team is the ability to enter notes, findings and commentary directly into the assessment workspace (visible only to users with proper permissions). This real-time collaboration feature creates greater alignment between our customers and our services team. Assessment and report notes highlight, in real time, potential areas of concern or actual risks so they can be addressed or mitigated as quickly as possible without “falling through the cracks,” a refrain we hear too often. Keeping notes during the course of an assessment also accelerates the completion of a Report of Findings once the assessment is complete.
User-specific work queues contain tasks that have been assigned either automatically based on workflow and rules or by a team member. This task management feature allows users to focus on specific tasks that are open and require attention through email and platform notifications. Any user whether a customer’s security team member, an Intraprise Health security SME, an organizational stakeholder (e.g. business or system owner) or external third-party has a work queue by which to manage their open tasks.
Clear and easy to understand dashboards are a central feature of Protect™ and are visible at various levels of the platform. Program-encompassing dashboards illustrate the performance of the security program in real-time. Risks are ranked by criticality and are clearly visible to the security team. Module-level dashboards show progress and performance of specific programs such as TPRM. There are also workflow dashboards which show the progress at milestone stages and by risk severity. Risks can be captured from external sources through various methods to correlate trends, aggregate risks, further enhance analysis capabilities and drive workflows such as remediation management.
The greatest risk to healthcare providers and payers comes from Third-party/ vendor risks
Explosion of the health tech sector has launched hundreds of new companies that access, store, manage and process heath data
More than 59% of data breaches originate with a third-party vendor
Responsibility for third-party risk
management has no clear owner and a variety of different tools and manual processes in use
Lack of resources and expertise combined
with an inability to retain talent are exacerbating the problem
Keys to a Successful Third-Party Risk Management Process
CISO Magazine – TPRM by Sean Friel
Intraprise Health BluePrint Protect Can Help Detect and Manage Security Risks (8/19)
HealthcareIT News
Intraprise Health Platform Strengthens Healthcare Security (8/13)
Search Health IT: Tech Target
–Sean Friel, CEO, Intraprise Health