Getting Started: Product Onboarding and Integrations
You are about to begin your first steps on your journey with Living Security to better prepare your organization for Human Risk.
📚Overview
Welcome to Living Security's Human Risk Management Platform! This article is here to help begin your relationship with Living Security's products and its requirements/features. In order to make this a seamless endeavor, we have written this article set to breakdown what you will need to get you and your organization into our products as quickly as possible.
✅ We highly recommend you share this article within your organization's IT team(s) and stakeholders so that any requirements can be met proactively.
To jump to a specific section of this article please select an option below:
❓What is Living Security's HRM Functionality?
For a detailed breakdown of the key functionality that best enables your organization to address Human Risk, please see below articles that seek to clearly define the value and tools that will empower you and your organization to succeed within HRM Platform.
- What is Training Platform?
- What is Teams Cyber Escape Online?
- What is Unify Insights?
- What is Phishing Simulation?
⚙️ What are Living Security's HRM Requirements?
Every new product onboarding requires key events to take place to ensure both the vendor and product(s) are both secure to use and proactively benefit your organization in both value and functionality. Living Security has pre-written articles that cover the following:
- What requirements we seek to have your environment meet, and why we need those requirements met?
- What standards does Living Security and its HRM product meet, and how does it conform to your own environment's compliance policies?
To address those questions, we have written the below article series that you may send to the requisite team(s) to start their SLAs/tickets.
❗Your organization will have IT and Compliance Policies and/or Procedures that may have established timetables or requirements that must be met to begin their processes. We highly recommend that you engage with your IT and Compliance stakeholders as soon as you are able, and forward them this article so that they are proactively resolving initial questions or concerns surrounding the HRM Platform.
🌐 Whitelisting
The HRM Platform operates as a Software-as-a-Service(SaaS) product. In order for this product to function seamlessly, it requires your IT organization to both review whitelisting requirements so that our application can both send and receive data while it is being consumed by your organization's users. To breakdown what is necessary to whitelist, and why each service needs to be whitelisted, we have written the below comprehensive articles covering this requirement.
🔍 Compliance
All organizations maintain strict policies and requirements for vendors and their products to meet. These requirements can both be dictated by industry standards, as well as based on internal requirements that are unique to your organization's IT and Compliance environment. Don't worry though! Living Security actively seeks to allay any concerns and answer any question an organization might have surrounding how our product functions, both from a security and a compliance standard.
For a detailed breakdown of our product's compliance standards and how it may address your regulatory requirements, please see below list of articles.
👤 Identity Management
Your organization will need to provision users in order to grant them access to Living Security's HRM Platform. We have a series of articles for your IT organization to follow. We recommend starting with our Onboarding Overview: Identity Management, but for a specific functionality series of articles you can find them below.
📉 Unify Integrations
One of the key benefits of Living Security's Unify Insights functionality. It allows your organization's cyber security team to analyze your attack footprint from a Human Risk perspective, and address those risks proactively via Action Plans.
In order for Unify Insights to work, this will require your organization to integrate SaaS cyber security tools to the HRM Platform. For the series of articles that help guide the requisite personnel in managing this process, please see below.