With businesses facing increasing pressure from customers, regulators and auditors to demonstrate better compliance, manage risk and provide assurance, Acuity has announced the release of two new applications for its popular STREAM Integrated Risk Manager software.

Acuity’s new STREAM ISO 27001 application is designed to help users comply and gain certification to ISO 27001:2013, using the full range of STREAM’s dashboarding and graphical reporting to measure, monitor and report on compliance with the latest ISO standard. Originally published in 2005 and updated in September 2013 by the International Organisation for Standardisation, ISO 27001 is the recognised global standard for information security management.

In response to growing demand for greater visibility and assurance that company supply chains are not a source of unacceptable risk, Acuity has also released its new Supply Chain Risk Management application. As part of the popular STREAM Integrated Risk Manager software, users can model their supply chain and benefit from enhanced decision making, though visibility of supplier compliance and levels of risk.

STREAM scales seamlessly from a single-user edition to an Enterprise-wide, multi-user edition and can be accessed via a web browser, mobile device including iPad, iPhone and Android, or traditional client–server architecture. It can be deployed in-house or provided as a hosted SaaS service and a free single-user edition is available to help users get started.

STREAM customers include BP, United Nations, CSC Computer Sciences, Siemens, The Cooperative Banking Group, Fujitsu Services and the Department for Education. “Risk management is a core competence for any public or private sector organisation,” said Simon Marvell, Partner at Acuity Risk Management. “STREAM is designed to support integrated risk and compliance applications such as information security, supply chain risk, health & safety and environmental management, as well as provide a holistic, multi-application Enterprise Risk Management (ERM) solution. Organisations that rely on manual processes and spreadsheets can migrate these time consuming risk and compliance processes into STREAM and also interface with third party solutions to maximise return on investment.”

Understand how AI can transform business security strategies with our insights and analysis on AI in security.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...