Frequently Asked Questions

Pentaguard uses standard web-based technologies that your existing support service providers should be familiar with.  If changes are required to align to your specific requirements, we are happy to discuss changes.
When you create an assessment, you are able to attach any additional information in the form of files to the assessment.  You can simply drag and drop them into the assessment.  Pentaguard also provides you with a number of templates that can assist you in developing further risk mitigation strategies.
Yes they can.  Pentaguard uses a standard OIDC/OAuth service internally to authenticate users but this can be federated to use your own OAuth or LDAP authentication services.
Yes it can.  Pentaguard uses standard technologies and can be installed on separate, on-premise servers or within private, on-site cloud architectures.
Pentaguard is able to support any number of users.  The platform is fully secure and users can be given multiple roles so you can control who can carry out assessments, reviews and approvals. Visibility into all parts of Pentaguard can be controlled.
Pentaguard supports many different categories of assets.  You are able to select the asset category and sub-category and its criticality. Importantly, you can define the implications if the asset is disrupted.  This allows anyone reviewing the assessment to have the full context around the asset.
Whenever you change any part of the assessment ratings, the new values are calculated immediately ready for your review.
Pentaguard uses a sophisticated combination of role-based and attribute-based access control and encryption to secure access right down to the data level. Security can be further improved when approved cloud hosting providers are used who are certified to Government protected security levels.
Yes it is.  Pentaguard can be deployed on both public and private cloud services.
As users must log in before they can do anything on the platform, all changes in the platform are recorded against the user who makes the change.  An audit trail can then be recovered and reviewed to determine who did what and when.