Key Benefits

  • Quickly identify and remediate security gaps
  • Gain holistic visibility into cybersecurity preparedness and performance
  • Streamline certification efforts across one or multiple frameworks
  • Prioritize cybersecurity investments
  • Demonstrate program effectiveness to senior leadership and auditors

Cybersecurity Control Framework

Designed to drive efficiency, the ProcessUnity metaframework maps your controls to all relevant regulations, internal policies and standard cybersecurity frameworks, including NIST Cybersecurity Framework (CSF), NIST 800-53 and ISO 27002. This approach eliminates duplication in your existing control structure, providing a consolidated library tailored to your program data.  Your unique metaframework is scoped via a step-by-step, self-guided assessment. Once your requirements are identified, ProcessUnity CPM generates a day-one operational control library covering more than 1,000 control standards to support your cyber program’s current and future requirements.

Control Evaluation Engine + Evidence Collection Database

Powered by ProcessUnity Hands-Free AutomationTM, the Control Evaluation Engine keeps cybersecurity program activities on schedule throughout the year – ensuring that all tasks are completed, and control evidence is captured. You specify the cadence of your program activities, from control reviews to facility assessments. ProcessUnity CPM manages the rest: the platform triggers assessment distribution and assigned stakeholder reviews, tracks completion status, and sends reminders when tasks are running late.

ProcessUnity CPM automates:

  • Threat Reviews
  • Risk Evaluations
  • Control Reviews
  • Policy Reviews
  • Change Reviews
  • Incident Reviews
  • Training Program Validation
  • Issue Remediation
  • Facility Assessments
  • Application Assessments
  • System Assessments
  • Baseline Assessments

Automated evidentiary requests ensure that the appropriate owners supply evidence to support control, risk and asset reviews when required. Owners can attach evidence directly to the request, which is then organized within to streamline certification and audit requests.

Issue Remediation Suite

Offering end-to-end support for the issue lifecycle, ProcessUnity CPM automatically flags non-preferred responses during control evaluations for streamlined issue remediation. You can create issues based on flagged responses, ensuring that important project data remains tied to the issue.

In-depth detail on project status provides a comprehensive view of your program’s progress on key security initiatives. The platform tracks issue status through remediation, allowing you to communicate milestones and budgetary needs.

Cybersecurity Performance Command Center

The Cybersecurity Performance Command Center provides powerful tools and targeted intelligence for measuring your cybersecurity effectiveness. With the click of a button, you gain one-stop visibility into your security gaps, control performance, regulatory proficiency and project status across your program.

Interactive dashboards provide you real-time, drill-down insight into the status of threats, risks, policies, controls, issues and incidents. In seconds, you can generate a custom, board-level report on the state of cybersecurity across all relevant risks, controls, assets, issues, projects and policies. Configurable reports allow you to demonstrate program performance to senior leadership and auditors.

Preconfigured, out-of-the-box reports include:

  • Threat History & Trending
  • Risk Remediation Status
  • Policy Control Coverage
  • Controls Effectiveness
  • Top Third Parties at Risk
  • Current Cyber Review Requests
  • Risk Prioritized Projects
  • Top High-Value Assets at Risk
  • Organization Training Coverage
  • Due Diligence Requests
  • Issues Summary Status
  • Major Incidents Status


Cybersecurity Program Roadmap

As your cybersecurity program matures, you will need to quickly answer new demands from all angles. ProcessUnity CPM lays the foundation of your program to support future needs as they arise, whether it’s pursuing a certification, managing third parties or launching new policies. Supported program activities include:

Exam and Certification Readiness

Prepare for audit reviews and achieve certification with built-in preparation

Learn More: Exam and Certification Readiness

High-Value Asset Management

Protect your applications, systems, facilities and vendors

Learn More: High-Value Asset Management

Cybersecurity Risk Administration

Identify, monitor and mitigate risks

Learn More: Cybersecurity Risk Administration

Organizational Cybersecurity Governance

Manage cybersecurity accountability across your organization

Learn More: Organizational Cybersecurity Governance