Project Remedies: your one-stop-shop for great people and great products. Let's talk.
We help our clients:
Reduce risk. Reduce risk. Reduce risk.
Does stuff happen? Of course. Our team of senior leaders has been there. The products we have chosen to represent are proven and always offer great value.
Lower cost. Lower cost. Lower cost.
PEPPER leverages your existing staff and investments as much as possible, minimizes what you have to pay and has you back in business as soon as possible. We are the low cost provider.
Automate. Automate. Automate.
Automating speeds up response and reduces the opportunities for human error. Automating gives you confidence that you are in the best position possible to withstand an attack.
-
Project Remedies is a solution provider, providing superior products combined with high quality, end-to-end support services for each of our customers. We and our partners have the same values: are all smart, honest, hard-working, competent and innovative team players who finish projects. We all listen well, put the customer first, and come to you with a great deal of real-world, hands-on experience and expertise.
Actifile. Really reducing risk:
Actifile has revolutionized data loss prevention.
- Do you assume your data will be stolen?
- Do you think you know all of the files on your network?
- Would you like to know the value of all of your data? Continuously?
- For forensic purposes, would you like to keep track of all of the activity: in use, at rest and in transit?
- Is your existing DLP system cumbersome, hard to administer and generating too many service desk tickets?
If all of your answers are “Yes,” Actifile should be your data loss prevention tool.
Actifile has revolutionized data loss prevention. Actifile works to reduce your company's risk in three key areas:
- Identifies sensitive data across your environment, including the hidden files, and quantifies the RISK of that information - ROM Return on Mitigation.
- Encrypts all of the specified files - Prevents Cyber Threat Actors, Ransomware, or Malicious employees from profiting from using your most sensitive data.
- Tracks End-User & Application Behavior – Monitors files and report on data at rest, in-use, and in-transit (Insider RISK) i.e. Did my employee email my customer contact list and revenue targets to my competitor? Also, identify applications that probably shouldn’t be accessing sensitive data.
And once implemented, all of the data is encrypted automatically. No one has to do anything. The end-user does not know that the file he/she is using is encrypted.
One way Actifile reduces a company’s risk is insuring that the company is compliant with your cybersecurity insurance policy. Many companies are out of compliance with their policies and find out the hard way when a breach occurs. They told the insurance company that they have a specific number of files, i.e. the files they know about. Unfortunately, the number did not include the hidden files, the ones they do not know about. The insurance people send in their people, find the hidden files and refuse to pay on the claims. As you probably know, Target and Equifax are still chasing their money. Actifile finds all of the files and is doing so continuously, automatically.
And Actifile is less expensive. The license fees are typically half the cost of the major DLP systems on the market. Because it is easier to use and easier to administer, fewer support people are involved. Actifile is also the best value in this niche.
APM+:
APM+ (Automating Project Management Plus) connects policy to process to proof. It answers your "how do you know questions" such as:
- How do you know if your people are working to the standard?
- How do you know what the standard is?
- How do you know and how do you communicate how busy your people are?
- How do you know how long each project actually takes and actually costs?
- How do you know each department is staffed to the demand?
- How do you know which teams are working most efficiently and least efficiently?
- How do you know where there are opportunities for efficiency?
- And more.
APM+s is a mature, comprehensive, structured approach to actually managing work. It is designed to be used by mature companies and government agencies with lots of projects and lots of people, organizations looking for:
- Improved compliance and auditability outcomes.
- Improved consistency and transparency.
- Implementing accountability and discipline.
- Capturing the metrics needed to optimize performance and improve efficiency.
- Finishing more projects, on time and on budget
- Utilizing your people more effectively
- Being able to respond to change quickly
- Giving leaders access to all projects at any time.
APM Plus requires participation. The people who work the tasks actually status the tasks. That way, there are no excuses. Automating almost everything, including automating notifications to people at the right times in time for them to take action, APM Plus is intuitive and very easy to use by people in each of the roles. APM Plus saves a great deal of time because it:
-
- Eliminates the need for project managers to create project plans and cost plans from scratch every time.
- Eliminates the need to train project manager on the processes.
- Eliminates the need to train the people working the tasks on the details of the processes.
ACIRM+
ACIRM+ (Automatic Cyber Incident Response Management Plus) provides your company with a systematic approach that supports your need to move beyond ad-hoc risk practices that exposes executives, board members, and now CISOs to emerging obligations. ACIRM+ is a standalone, cyber risk management program with trusted and repeatable outputs that helps your organization navigate the heightened regulatory expectations effectively. It is designed to capture all cyber incidents globally and then, acting as a funnel, notify your cyber incident response team that they have a new response to manage. Each response is managed as a project, i.e. to a timeline. All the data needed to report to CISA as well as the Attorney General are captured. ACIRM+ provides a clear articulation of your processes for managing risks, and timely escalation and disclosure of material risks. Consistency and transparency are key benefits.
ACIRM+ is our low cost, fixed price SaaS offering designed for being the one tool you need to capture and manage all cybersecurity incidents that are identified in your organization, from the initial capture through to resolution. And the system can be configured to meet your company’s specific requirements.
Having studied the regulatory requirements, we used the NIST SP 800-61 R2 on Cyber Incident Handling and the SEC’s 4-day regulation as the models to follow. Significantly, if there are deadlines i.e. reporting to CISA within 4 business days of determining materiality or requesting a delay from the FBI, automating this and managing to a timeline are both critical.
ACIRM+ includes:
- A unique Cyber Incident Intake form that can be used by everyone in the company to capture the incident. The good news is that there are no user licenses involved.
- A special version of APM+, our robust, business process-based project management system that includes process management, project management, resource management, cost management, document management, reports, automatic notifications and more. We have added a “cyber tab” where all of the necessary information about the incident can be captured and stored.
- The reports you need to report to CISA, the Attorney General and more.
- Your incident response processes, one for each incident type.
- The members of your cyber incident response team.
How does this work? When entering a new incident, the user selects an “incident type” from a menu. They attach documents if available. When he/she hits Save, automatically at network speed, a project plan / timeline is generated in APM+ using your related cyber incident response process as a template and the person responsible for managing this type of incident is notified that he/she has a new project to manage. The “project manager” (who does not have to be a trained project manager) or a resource manager assigns people to work each task. The plan is approved, and the work starts. The people who work the tasks status the tasks. Documents are attached. Task duration and time spent (two of the requirements in the NIST SP 800-61 R2 (section 3.4.2)) are captured. Leadership can see all of this at any time. Reports are available for after action reviews and to identify opportunities to improve the processes, increase efficiency and lower cost.