tandem Policies

Policies and procedures are the primary method financial institutions (banks, savings associations, credit unions, and trust companies) use to define controls. Too often, after they are developed, they end up just sitting on a desk and collecting dust until the next exam.

CoNetrix offers an online solution to help you create and maintain your enterprise-wide policies in tandem. Maintain all of your financial institution’s policies in tandem with special category access roles and an enterprise-wide Acceptable Use Policy (AUP) generated from your individual policies and categories.

Additionally, the tandem Policies module comes with expert-designed Information Security Policies customized for your institution through a questionnaire. The Information Security Policies section includes:

  • More than 55 pre-defined policies, designed to be in compliance with information security and cybersecurity regulations, including Incident Response, Change Management, Core Application, Electronic Banking (e-Banking), Firewall, Mobile Devices, Social Media, and Wireless Network Access
  • Ability to define verification items for each policy and roll them into various committee meeting agendas
  • Each policy is mapped to appropriate regulatory guidance (FFIEC, FDIC, OCC, Federal Reserve, and NCUA) and the system optionally allows you the ability to include the following standards:
    • COBIT 4.1
    • NIST SP800-53
    • ISO Standards
    • PCI DSS vs. 2.0

Request a Quote

Features

The CoNetrix Policies software is feature-rich, including:

  • An Access Control List (ACL) report generator tool
  • Suggested Information Security Policies created and updated by security and compliance experts
  • Downloadable documents in Microsoft Word and/or Adobe PDF formats
  • Free automatic updates during subscription term
  • Free training workshops to help familiarize you with the software
  • Integration with other CoNetrix online software
  • Anywhere/anytime Internet access through a secure, online portal
  • Multi-factor authentication (optional)
  • Multi-user access
  • No software installation or equipment costs
  • The ability to manage several companies’ Policies with one login (requires a subscription for each company)