Requirements for Enterprise Security Performance Management

Published On: July 16, 2020

We are delighted to see that someone of Ed Amoroso’s prominent standing in the cybersecurity world has taken an interest in Security Performance Management (SPM). In this short white paper, Ed points out that security assessments are becoming more continuous in nature, rather than remaining point-in-time snapshots. He goes on to describe the variety of actors whose needs must be taken into account in any SPM initiative – it’s not just the security and audit teams! 

Most importantly, Ed provides readers a set of five requirements for any SPM platform, to help guide organizations in selecting the right SPM tool. The five key capabilities are: Workflow, Analysis, Planning, Remediation, and Metrics.

SPM Requirements

One key takeaway is that an SPM solution needs to integrate with the existing security and GRC tooling to deliver optimum workflow automation and speed of decision-making. 

Of course, we think we’ve already built the kind of SPM platform that Ed describes! Integrations with workflow, analytics, and planning tools? Check. Built-in, prioritized remediation recommendations? Absolutely. Metrics, reports, and cost estimates aimed at all stakeholders? Naturally.

SPM is a relatively new product category, and buyers are still just becoming aware of it and how it solves problems with communications, budgeting, and prioritizing. Here at TrustMAPP, we are hard at work educating the marketplace about the power of SPM. Having someone like Ed Amoroso recognize the need for SPM is wonderful news. 

Contact us if you’d like to learn more.

Browse These Topics


2022 Cyber trends Affordable Information Security Platform Affordable Security Assessment Tool analyze security data findings analyze your security data Assess Company's Security Readiness ciso CISO investment strategies Common Employee Data Security Mistakes company cyber security plans company that specializes in preventing data breaches company’s Internet security cybersecurity budgeting cybersecurity is discussed in board meetings data breach readiness Data Security Data Security Tactics Facebook Safety Federal Trade Commission’s cybersecurity standards fighting security attacks financial data stolen improving the information security of your company increase cyber security across your entire company information protected from a Malicious Cyber Attack Information Security Best Practices interactive security software platform Keep Cloud Storage Secure long term information security solutions maintain a successful security roadmap predict and protect yourself from potential threats prevent a devastating security breach prevent unauthorized access to your network prioritize potential threats Real-time Cyber Security Software real time information security Recent High Profile Companies with Data Breaches reduce cyber vulnerabilities security software dashboard for your entire company security team assess risk Simple Internet Safety stay ahead of cyber security threats unintentional data leakage valuable metrics and processes verbally explain the cyber security threats victim of a cyber security breach