{"id":7579,"date":"2021-03-15T03:36:21","date_gmt":"2021-03-15T03:36:21","guid":{"rendered":"https:\/\/zhorse.net\/?page_id=7579"},"modified":"2023-05-17T00:59:16","modified_gmt":"2023-05-17T00:59:16","slug":"asset-management","status":"publish","type":"page","link":"https:\/\/zhorse.net\/risk\/asset-management\/","title":{"rendered":"Asset Management"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Asset Management<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Software for information asset inventory and classification<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Software for the asset and cyberasset information inventory, assessment, and classification, personal data protection and privacy. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Z Horse makes information inventory management, asset and cyber asset classification comprehensive, easy and agile.<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Capabilities<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
  • Identify information assets, their location, owner, custodian, dependencies, where they are used and what for, and related legal and compliance aspects.<\/li>
  • Assess how critical an asset is by rating confidentiality, integrity, availability, and other attributes required by your organization.<\/li>
  • Classify information and establishment of controls for its appropriate management and treatment.<\/li>
  • Generate visual reports and data on asset management status with an inventory matrix and asset classification, including the creation of personalized reports.<\/li>
  • Manage the identification and handling of personal data and privacy.<\/li>
  • Create forms to register the information needed for asset management.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
    \n\t\t\t
    \n\t\t\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t

    Advantages<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t
    • Easy and practical management of the information asset inventory, assessment, and classification.<\/li>
    • Compliance with laws and regulations related to information management, information security, personal data protection, and appropriate information classification and treatment.<\/li>
    • Practical and agile deployment of asset management, reducing the time needed for consolidation, updates, maintenance, and reporting.<\/li>
    • Quick response to questions from audit or control bodies and business questions concerning information asset management.<\/li>
    • Availability of the change history, traceability, and notifications about asset identification, assessment, and classification activities performed by the processes.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t

      Extras with Z Horse<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t\t\t\t\t
      • With the Z Horse Risk module you can identify and manage the technology, continuity, information security, personal data protection, and other risks associated with information assets.<\/li>
      • Using the Cybersecurity module, your asset inventory can automatically synchronize with your SIEM (Splunk, Elasticsearch, OSSIM, AT&T AlienVault, IBM QRadar) inventory, and you can see the assets with alarms or critical events that pose risks.<\/li>
      • You can link the event-affected assets to the incidents, considering their level of criticality.<\/li>
      • In the Compliance module, you can see the assets that have a standard-specific control in place and monitor their status.<\/li>
      • The Indicators module and the Balanced Scorecard module allow you to establish the asset management efficacy indicators.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

        Asset Management Software for information asset inventory and classification Software for the asset and cyberasset information inventory, assessment, and classification, personal data protection and privacy. Z Horse makes information inventory management, asset and cyber asset classification comprehensive, easy and agile. […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7795,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7579","page","type-page","status-publish","hentry"],"yoast_head":"\nSoftware for information asset inventory and classification | Zhorse |<\/title>\n<meta name=\"description\" content=\"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zhorse.net\/risk\/asset-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software for information asset inventory and classification | Zhorse |\" \/>\n<meta property=\"og:description\" content=\"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zhorse.net\/risk\/asset-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Z Horse - GRC Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ZHorseGRC\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T00:59:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"160\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ZHorseGRC\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/zhorse.net\/risk\/asset-management\/\",\"url\":\"https:\/\/zhorse.net\/risk\/asset-management\/\",\"name\":\"Software for information asset inventory and classification | Zhorse |\",\"isPartOf\":{\"@id\":\"https:\/\/zhorse.net\/#website\"},\"datePublished\":\"2021-03-15T03:36:21+00:00\",\"dateModified\":\"2023-05-17T00:59:16+00:00\",\"description\":\"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.\",\"breadcrumb\":{\"@id\":\"https:\/\/zhorse.net\/risk\/asset-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/zhorse.net\/risk\/asset-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/zhorse.net\/risk\/asset-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/zhorse.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk\",\"item\":\"https:\/\/zhorse.net\/risk\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Asset Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/zhorse.net\/#website\",\"url\":\"https:\/\/zhorse.net\/\",\"name\":\"Z Horse - GRC Software\",\"description\":\"Strong and Agile Enterprise GRC Software\",\"publisher\":{\"@id\":\"https:\/\/zhorse.net\/#organization\"},\"alternateName\":\"ZHorse\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/zhorse.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/zhorse.net\/#organization\",\"name\":\"Z Horse\",\"alternateName\":\"ZHorse\",\"url\":\"https:\/\/zhorse.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zhorse.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png\",\"contentUrl\":\"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png\",\"width\":300,\"height\":160,\"caption\":\"Z Horse\"},\"image\":{\"@id\":\"https:\/\/zhorse.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ZHorseGRC\",\"https:\/\/x.com\/ZHorseGRC\",\"https:\/\/www.linkedin.com\/company\/z-horse\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software for information asset inventory and classification | Zhorse |","description":"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zhorse.net\/risk\/asset-management\/","og_locale":"en_US","og_type":"article","og_title":"Software for information asset inventory and classification | Zhorse |","og_description":"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.","og_url":"https:\/\/zhorse.net\/risk\/asset-management\/","og_site_name":"Z Horse - GRC Software","article_publisher":"https:\/\/www.facebook.com\/ZHorseGRC","article_modified_time":"2023-05-17T00:59:16+00:00","og_image":[{"width":300,"height":160,"url":"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ZHorseGRC","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/zhorse.net\/risk\/asset-management\/","url":"https:\/\/zhorse.net\/risk\/asset-management\/","name":"Software for information asset inventory and classification | Zhorse |","isPartOf":{"@id":"https:\/\/zhorse.net\/#website"},"datePublished":"2021-03-15T03:36:21+00:00","dateModified":"2023-05-17T00:59:16+00:00","description":"Manage information assets based on confidentiality, integrity, and availability. CIA triad. Inventory asset management.","breadcrumb":{"@id":"https:\/\/zhorse.net\/risk\/asset-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zhorse.net\/risk\/asset-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/zhorse.net\/risk\/asset-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zhorse.net\/"},{"@type":"ListItem","position":2,"name":"Risk","item":"https:\/\/zhorse.net\/risk\/"},{"@type":"ListItem","position":3,"name":"Asset Management"}]},{"@type":"WebSite","@id":"https:\/\/zhorse.net\/#website","url":"https:\/\/zhorse.net\/","name":"Z Horse - GRC Software","description":"Strong and Agile Enterprise GRC Software","publisher":{"@id":"https:\/\/zhorse.net\/#organization"},"alternateName":"ZHorse","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zhorse.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zhorse.net\/#organization","name":"Z Horse","alternateName":"ZHorse","url":"https:\/\/zhorse.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zhorse.net\/#\/schema\/logo\/image\/","url":"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png","contentUrl":"https:\/\/zhorse.net\/wp-content\/uploads\/2021\/03\/z-horse-logo.png","width":300,"height":160,"caption":"Z Horse"},"image":{"@id":"https:\/\/zhorse.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ZHorseGRC","https:\/\/x.com\/ZHorseGRC","https:\/\/www.linkedin.com\/company\/z-horse"]}]}},"_links":{"self":[{"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/pages\/7579"}],"collection":[{"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/comments?post=7579"}],"version-history":[{"count":5,"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/pages\/7579\/revisions"}],"predecessor-version":[{"id":12745,"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/pages\/7579\/revisions\/12745"}],"up":[{"embeddable":true,"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/pages\/7795"}],"wp:attachment":[{"href":"https:\/\/zhorse.net\/wp-json\/wp\/v2\/media?parent=7579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}