Bento Assurance HQ.
|Cybersecurity is both a standardized process and one that is remarkably custom to each business. The same is true for the process of managing and maintaining security assurance. We built our own database systems, audit tools, and now this!
Got it! We'll be in touch.

Designed for Small Business.
We built Bento Assurance HQ to connect our auditing and information management tools with our clients. The portal is available to all client organizations and helps integrate cybersecurity thinking into human resources and daily operations.
Employee Portal
Simple and playful design brings transparency to information security. Employees have access to useful information, have easy access to policies, and can report concerns with ease.

On and Off-boarding
People's profiles include tracking for access control, license usage, and policy compliance from the time the start, through their employment, and for departure.

System Inventory
Bento Assurance HQ enables clients to track all systems, highlight important ones, and create battle cards with authentication, access control, backup, security, and risk analysis all in one place.

Changes, Events, and Incident Record
Events, incidents, and changes are tracked by our teams and yours, and displayed on a timeline. This facilitates reporting, learning, and incident management.

Available on all plans.
Bento Assurance HQ, launched July 1, 2022, is a value-added benefit for all our clients.
Capabilities
We are so excited and proud of Bento Assurance HQ, as it was the final piece to connect our work with our clients.
People and Device Inventory
Software costs, access control lists, device inventory, start and end dates, access review history, and onboarding/off-boarding tasks.
Vendor Management
Application and system inventory, security objectives, risk assessments, procedures, users, tasks, backup and recovery process, authentication system design, and compliance.
Change & Incident Tracking
Classification and priority, incident metadata, incident log, incident management process, post mortem and review.
Policy and Training
Policy templates and recommendations, control relationships, and employee acknowledgement tracking.
Controls & Evidence
Control and implementation tracking, control recommendations, evidence recommendations, and evidence collection.
Operational Tasks
Recurring Tasks link to systems, policies, controls, and evidence and enable operations and security teams to continuously maintain security assurance.