Utilize natural language processing to efficiently import, map, and store existing security documentation with critical frameworks and standards
PLANO, Texas–(BUSINESS WIRE)–#ai—Tentacle, a platform that modernizes information security management by empowering organizations to assess their current security state, to improve overall posture, to communicate data to stakeholders, and to manage ongoing third-party risk, has announced Tentacle AI Control Mapping; a machine learning and natural language processing-fueled feature expected to transform an organization’s ability to centralize and leverage critical cyber security information.
Tentacle AI Control Mapping is the first of a series of machine learning-powered features scheduled to be released, all of which are designed to drastically reduce the time and effort related to manual and repetitive tasks. Tentacle AI Control Mapping enables organizations to leverage existing program documentation to quickly migrate from outdated tools (including spreadsheets) or to easily build out a security project within Tentacle. Phase 1 of the release is also expected to significantly decrease the amount of time dedicated to assessment response. Tentacle anticipates future add-ons to further expand the overall capability therefore creating an opportunity to offer a one-of-a-kind solution for automating accurate response to security questionnaires.
The new feature, described as a market differentiator by beta testers, combines natural language processing and machine learning to quickly analyze an imported template and provide users with matched controls from Tentacle’s extensive framework library. Tentacle began efforts to “train the model” over 6-months ago, using existing application data to fine tune the algorithm. Users will continue to seamlessly feed ongoing data points into the model by confirming the proposed matches and by making necessary edits throughout the process.
“Our team is very excited to release this new feature within the Tentacle platform,” stated Matt Combs, Founder & CEO. “We’ve been extremely thoughtful in developing new and innovative solutions that deliver actionable value to our users; be them large or small organizations, security analysts or CISOs, auditors, assessors, or even managed service providers. If the initial release of our Tentacle AI Control Mapping model is able to yield a match rate between 80 – 90%, then we have very high expectations for reaching at or near precision in the near future. The impact this will have on time saved will truly be significant,” continued Combs.
Tentacle AI Control Mapping offers organizations a substantial jump-start in the centralization of security information. In doing so, Tentacle anticipates the ability for users to expedite the analysis of risk, the progress towards improvement, and the ability to comprehensively communicate program details to necessary stakeholders – all without sacrificing valuable, pre-existing documentation. With Tentacle AI Control Mapping, organizations can more rapidly manage security questionnaires by mapping imported security questions to applicable responses from security frameworks, such as SOC2, PCI-DSS, and ISO 27001.
“In today’s ever-evolving threat landscape, organizations can’t afford to forgo a thorough, well-documented, and easily communicated security posture,” says Combs. “With Tentacle AI features like Control Mapping, users don’t have to sacrifice past efforts in order to harness the exciting capabilities of today’s technology to solve real, daily challenges.”
AI Control Mapping is now available on Tentacle’s Professional tier and for all new users to experience as part of a free trial. To learn more about how Control Mapping can help your organization streamline its security response implementation process, visit: https://www.tentacle.co/
About Tentacle: Tentacle is a SaaS-based information security platform located in Plano, Texas. The company offers a configurable data management tool that helps organizations improve their information security programs and overall security posture. With Tentacle, enterprises of all sizes can manage all details related to their internal security posture, track and monitor similar information for their partners and vendors, centralize the storage and management of program-related documentation, increase connectivity with key partners, establish multiple internal projects for tracking independent security requirements, and continually benchmark their activities against leading industry frameworks in the information security space. For more information, visit www.Tentacle.co.