Exonaut® Software Solutions
“The biggest risk that we are currently facing, is the fact that we do not know what risks we are currently facing.”
– Quote from the Chief Security Officer for an enterprise with a global footprint, prior to selecting the Exonaut® software suite for their organisational readiness.
With Exonaut® you can start where you have the most challenging demands, it allows for gradual scaling towards pre-defined milestones, maturity target or to the ultimate enterprise level: Fully Integrated Readiness. Exonaut® is scalable, from minor needs to extensive and complex operations with 1000’s of business units, employees and projects worldwide. Exonaut® offers a comprehensive and yet user friendly enterprise solution to manage the Readiness of your business and its requirements. As reflected by the user community, which includes Armed Forces, Law Enforcement and Cyber Agencies as well as several of the world’s largest enterprises, the suite is developed with high integrity in mind, and supports the most stringent global information and security standards.
Exonaut® – the Readiness Suite
The Exonaut® covers the full 4C Integrated Readiness Closed Loop cycle, where you in one suite can cover all your enterprise Readiness needs:
- Manage your Risks
- Plan your Business Continuity
- Train & Exercise for Resilience
- Secure Governance by Audits & Inspections
- Monitor your Readiness Operations
- Take action during Incidents & Crisis
- Restore, evaluate, adapt operational Readiness
Readiness Insights & Analytics – key for management
Exonaut® provide all the Readiness metrics needed for your board reporting, updated on a continuous basis with accurate, verified data.
- How many incidents did we have last quarter?
- How much did they cost?
- What are the top 10 risks across the organisation and what are we doing about them?
- What is the number of staff that has undergone security screening when they work at our key customer?
- How does our IT systems correlate to each other, and where do we have critical dependencies?
- How do I keep myself updated on an ongoing business disruption when I’m travelling?
- Where are we at with the investigation into the latest cyber-attack?
All this is available through our experienced experts and Exonaut® Readiness suite. Our experts provide you with proven frameworks and methods needed, our Exonaut® suite makes it possible to scale them across your organisation, and provide you with accurate data to give you the insights and trends you need to focus on what will keep your organisation secure and prepared.
Going from ad hoc initiatives to a truly data driven, persistent approach to Readiness.
Exonaut® & Information Security
Learn about how we are keeping your data safe and secure.
Book a workshop
Book a demo
Get in contact
Book a meeting
GAIN DEEPER INSIGHTS
Where is your industry going? Are you robust and resilient? Regardless of what industry you are in, risks, incidents, compliance and training activities all requires business critical capabilitites. Learn more about how you can manage your Readiness with the Exonaut® software suite.
What is Exonaut®?
It is a software suite designed and built by 4C Strategies to provide all the tools you need to build, verify and track your organisational readiness (risk, compliance, incident, crisis, continuity and exercise management).
Who is Exonaut® built for?
Exonaut® is designed to be used by risk managers, compliance officers, CSO:s, CISO:s and exercise managers to support them in their day to day operations. The reports and dashboards are meant to give senior level management an overview of the current readiness levels (risk exposure, compliance, training status, risks etc). Data capture interfaces are designed to support first line operators with limited or no domain knowledge, by using simple and clear interfaces. Second and thirds line assurance on the other hand has access to intuitive interfaces to slice and dice the data as appropriate for analytical purposes and to drive performance. All activities are supported by workflows and configurable notification rules to ensure that work is performed as intended.
How long does it take to implement Exonaut®?
Most organisations that select Exonaut® have a clear idea on what they want to achieve. When all framework and policy questions have been taken care of (risk criteria model, control catalogue, types of incidents etc.), an implementation project can be as short as four to six weeks. Typically, in sizeable organisations, three to six months from project start to go live is normal. Since Exonaut® is an enterprise solution this is very fast and can only be achieved due to the degree of configuration options build into the Exonaut® suite.
Who needs to be involved from our side when buying Exonaut®?
A typical implementation requires coordination between the main sponsor, usually a security, risk or compliance manager, with approval from senior management and supported by the internal IT department. This setup ensures a smooth implementation.
Is Exonaut® a cloud solution or an on premise solution?
Both. Exonaut® is offered as both Software as a Service (cloud based) or as an installed solution. The pricing is the same, and the solution is the same, and it is simply a matter of adapting to your IT security requirements. We have many customers with exceptional demands on information security, in which case a SaaS solution is not an option.
Is Exonaut® available on mobile devices?
Exonaut® is fully supported through native apps for iOS, Android and Windows – called Observer. The iOS and Andriod Observers are most likely the most powerful mobile tools available on the market to support anything from Command and Control in Law Enforcement to Field Observers in a number of Armed Forces and Incident and Crisis Management team with Banks, Airports and Utility providers. In addition, most of our modules also have a responsive web interface which allow for access from mobile devices using the web.
How secure is the information that you enter into Exonaut®?
Exonaut® has its origins within the military domain, so information and IT-security has been the top priority since the start. The Suite has a number of accreditation including for use in NATO Secret and Unclassified networks. Within the system itself, each information item is governed by a granular permission model, ensuring that a logged in user will see exactly what he or she is supposed to, and no more or less. Outside the system, each customer can apply their own chosen level of security, such as specialised encryption solutions and VPN-tunnels. Finally, for extreme security requirements, the entire system can be run in a master/slave configuration, enabling a master server to be kept separated from any attack vectors (internet, airwaves, radio, signals), while selected parts of the configuration can be used in a more open environment for a limited time period. When the required data has been collected, it is then merged with the master server again, without exposing the aggregated data to the outside world at any point in time. The capabilities this provides while maintaining strict information security is found in no other systems in operation today.
How does Exonaut® allow for compliance with the General Data Protection Regulation (GDPR)?
We are committed to protecting our customer’s data. This includes working hard to ensure that processing activities undertaken in Exonaut® comply with applicable data protection laws, such as the General Data Protection Regulation (GDPR).
Most of our customers choose to limit the personal information they process in the system to basic user identification data (such as names, e-mails and passwords) and can rely on our standard solutions for secure processing. Customers who wish to process other categories or types of personal data may need additional layers of security. We work closely with each customer to determine their specific needs with respect to data security, whether they choose our On-premises or SaaS solution. Please refer to “How secure is the information that you enter into Exonaut®?” for further information.
Exonaut®’s administrative tool-set allows for compliance with legal obligations relating to the rights of individuals (data subjects), such as deletion of and access to data.
Does Exonaut® come with GIS support?
Yes. An important function in Exonaut® is the ability to work with interactive maps and geographic information, especially when dealing with exercises, incidents and crises management. Exonaut® is delivered with multiple map server interfaces to provide for the integration of advance GIS-support both in desktop and mobile applications (for both on- and off-line). Usually our clients with need for GIS functionality already host their own map servers. Thus, instead of creating a parallel GIS system, Exonaut® provides a greater ROI to any investment in a bundled geographic information system.
Can I integrate Exonaut® with my [specific system]?
Exonaut® has an API which can be used to feed or collect data from other systems. There are a number of standard integrations available for the most common user management (AD) tools, as well as business intelligence tools, military simulators and emergency dispatcher tools to name a few. In addition, if there is a need, unique integration plug-ins can easily be designed and deployed using our extensive integration framework.
What dashboards are available in Exonaut®?
Each Exonaut® module comes with its own basic dashboard. However, if required, Exonaut® provides an integrated dashboard solution, enabling users to mix Exonaut® data from all modules in any way they request. It also provides intuitive drag-and-drop interfaces for designing any dashboard necessary. This is an optional extension. If the you already have a BI strategy and tools in place, these can of course be used to extract data and create Readiness dashboards, via the Exonaut® API.
Does Exonaut® come with a “Is My Staff Safe” function?
Exonaut® provides this function through Exonaut Responder, which allows for extensive multichannel (SMS, VOICE, TETRA, EMAIL, SPEAKER ALERT etc) outreach and call-backs, including so called geo-fenced mass notifications.