Bento Assurance HQ.

|

Cybersecurity is both a standardized process and one that is remarkably custom to each business. The same is true for the process of managing and maintaining security assurance. We built our own database systems, audit tools, and now this!

Request more info.
Loading...

Got it! We'll be in touch.

bento assurance hq screen shot

Designed for Small Business.

We built Bento Assurance HQ to connect our auditing and information management tools with our clients. The portal is available to all client organizations and helps integrate cybersecurity thinking into human resources and daily operations.

Employee Portal

Simple and playful design brings transparency to information security. Employees have access to useful information, have easy access to policies, and can report concerns with ease.

Our awesome features
On and Off-boarding

People's profiles include tracking for access control, license usage, and policy compliance from the time the start, through their employment, and for departure.

Our awesome features
System Inventory

Bento Assurance HQ enables clients to track all systems, highlight important ones, and create battle cards with authentication, access control, backup, security, and risk analysis all in one place.

Our awesome features
Changes, Events, and Incident Record

Events, incidents, and changes are tracked by our teams and yours, and displayed on a timeline. This facilitates reporting, learning, and incident management.

Our awesome features

Available on all plans.

Bento Assurance HQ, launched July 1, 2022, is a value-added benefit for all our clients.

Capabilities

We are so excited and proud of Bento Assurance HQ, as it was the final piece to connect our work with our clients.

People and Device Inventory

Software costs, access control lists, device inventory, start and end dates, access review history, and onboarding/off-boarding tasks.

Vendor Management

Application and system inventory, security objectives, risk assessments, procedures, users, tasks, backup and recovery process, authentication system design, and compliance.

Change & Incident Tracking

Classification and priority, incident metadata, incident log, incident management process, post mortem and review.

Policy and Training

Policy templates and recommendations, control relationships, and employee acknowledgement tracking.

Controls & Evidence

Control and implementation tracking, control recommendations, evidence recommendations, and evidence collection.

Operational Tasks

Recurring Tasks link to systems, policies, controls, and evidence and enable operations and security teams to continuously maintain security assurance.