Funky upgrades to Risk Management

different tools assembled

Summary of Changes

Segmente Risk Tags

1. Segmented Risk Tags

Alyne introduces segmented risk tags that allow enterprises fine-granular ways to categorise their risks, restrict access control and enable hierarchical risk reporting and governance.

Risk Management upgrades

2. Risk Management upgrades

Risk trends, risk heatmaps and risk exports are truly a cool bunch of new features in our current pro offering.

Tech check

3. Tech Check

At the login page a tech check brings technical issues to your attention that need to be resolved for the best Alyne experience.

Weiterlesen ...

Single sign on, more speed and power features

different tools assembled

Summary of Changes

Single Sign On

1. Single Sign On

Alyne now supports enterprise single sign on and authentication via Active Directory, Google G-Suite, Office 365 and others.

Controls from scratch

2. Speed

We tuned our web interface and give you the fastest Alyne user experience ever.

Archive Assessments

3. Power User Features

For our power users, we hide our templates initially and allow creating from templates as well as archiving of Assessments with one click.

Weiterlesen ...

Make Assessments flexible again!

different tools assembled

Summary of Changes

editing assessments

1. Add Assessment Recipients

For running or even closed Assessments you can add new recipients and Assessment Objects.

Controls from scratch

2. Controls from scratch

If you want to cover Controls outside of our Cyber Security, Data Privacy and IT Risk space, you can now create Controls from scratch using our well known Controls editor.

Euro, pound and dollar - displayed currencies symbol

3. Currencies

Alyne now supports 3 currencies: Euro, British Pound and Dollar - whatever Dollar.

Weiterlesen ...

Real-time, baby! But in control.

different tools assembled

Summary of Changes

Lightning symbol on green background

1. Real-time

Alyne real-time technology updates the screen within a second or less whenever you collaborate with colleagues.

cryptography access control

2. Access Control

Read and write access rights on Control Sets, Assessments, Controls and Reports enable fine-grained access control policies in your organisation.

Risk Archive

3. Risk Archive

Risk Management now supports archiving of Risks and even Risk Tags.

Weiterlesen ...

Vendor Governance Use Case

vendor governance logo with small white shops and one red one

Vendor Risk is one of the strongest contributors to operational risk. Poorly setup, it can be incredibly expensive and produce poor results. Alyne provides a powerful value proposition demonstrated in this use case video.

Weiterlesen ...