Services

Unique Client Solutions - Configured, Tested, and Verified

At a Glance

Professional Services Icon

Professional Services

Assists new clients in deploying the Keylight Platform and in performing advanced configuration to meet growing GRC needs. LockPath developed a complete toolset that enables you to completely configure the platform without writing a line of programmable code. The result is a Keylight implementation that can be measured in weeks, not months or years. Learn More

Support Services Icon

Support Services

Focused on providing our customers with fast, reliable solutions to issues that arise while using the Keylight Platform. Each issue submitted is reviewed and assigned to a live Support Analyst, who in turn, partners with you to best understand the issue, and provide the best available resolution in the shortest time frame possible. Learn More

Education Services Icon

Education Services

Delivers training that enhances customer success; during initial deployment, on-boarding new personnel, or platform maintenance. We strive to deliver content that is relevant and continues to expand our library, but also addresses major enhancements. Become recognized as a Keylight expert by completing our certification program. Learn More

Training & Certification

Discover – Develop – Deliver

Registered users can access our learning portal to view a course catalog, register for a session, or become Keylight certified. For questions, contact the Education team at training@lockpath.com.

Support Portal

Responsive – Reliable – Resourceful

Authorized users should use our customer support portal to submit tickets, search knowledgebase articles, and participate in user communities. For questions, contact Support at 913.601.4800 (opt.2.) or at support@lockpath.com.

Professional Services

The ProServ team initiates two types of engagements:

  • QuickStart – This required service provides new clients with an understanding of the platform’s core functionality. It includes fundamentals training for your platform administrators.
  • QuickPath – This optional consulting service consists of advanced configuration related to specific business processes, such as vendor management, incident management, internal audit/SOX testing, and compliance with security guidelines. These engagements are customized to fit your specific needs and level of desired investment, and provide additional “hands on” transfer of knowledge for your team.

The following timeline illustrates LockPath’s general deployment process to help new subscribers quickly benefit from their investment in Keylight.

Professional Services: QuickStart Diagram

QuickStart

QuickStart is the foundation for setting up Keylight and accelerating your team’s understanding of the platform’s capabilities. Once you have access to Keylight, the ProServ team will discuss with your designated project team how you plan to use the platform. The objective is to evaluate the maturity level of your compliance program prior to the import of authority docs and “live” data, development of tables and workflows, and creation of reporting/dashboards. The initial deliverable – a result of collaboration with process owners – is a roadmap that outlines the individual tasks to be completed by both the client user team and the LockPath ProServ team.

QuickStart Implementation Process

U

1. Scoping

Advanced preparation

  • Introduction
  • Establish agenda
  • Introduce support portal

3. Strategy Development

Series of calls to discuss objective

  • Outline requirements
  • Create roadmap for configuration
  • Identify processes for integration

2. On-Board Training

Variety of training options, starting with:

Foundations (Webinar)

  • Product navigation
  • Terminology basics
  • Application overview

Fundamentals (Classroom)

  • Administrator focus training
  • Hands on with the basics
  • User certification
f

4. Core Configuration

On-site client visit

  • Finalize strategic use for platform
  • Build foundation for key processes
  • Assist with security setup
  • Create key workflows, tables, and reports
  • Assist with connector integration

QuickPath

After QuickStart and fundamentals training, client teams are equipped to manage their Keylight platform and develop customized workflows to advance the uses of the individual applications. However, many client organizations are short on head count. As a result, they often turn to the ProServ team to assist in creating the “future state” environment and subsequent configuration of the platform to manage their identified risks. Individual projects – QuickPath consulting engagements – are designed to perform this advanced configuration and training.

Each project scope is designed to meet the specific parameters established by the client team, allowing management to determine the level of investment in line with the deliverables desired.

Audit-Icon

 

Internal Audit (SOX Testing)

Effective internal controls provide intelligence into an organization’s process and control framework. As Internal Audit assesses the organization’s risks and identifies controls to mitigate those risks, they can use Keylight to link the risk and control information, attach supporting documentation, track remediation efforts, and generate dashboards for real time reporting. Additionally, the security infrastructure allows you to create an environment for external parties (e.g., external auditors, regulators) to view your documentation.

Our ProServ team has developed a variety of workflows across the key phases of the audit process:

  • Planning – Issue assessments that leverage a risk-based approach and assist in the development of your annual audit plan.
  • Fieldwork – Create workpapers and attach supporting documentation that identify your controls and support testing/findings.
  • Review – Transition completed work to a manager and/or auditees for review and approval, including review notes and follow up.
  • Remediation – Easily identify gaps and automate the remediation process – tracking, prioritization, and follow up. Automate reminders to notify resources of deadlines. Real-time reporting delivers actionable information to key stakeholders.
  • Reporting – Centrally manage results from risk assessments, control testing, audit findings and unresolved issues. Administrative dashboards track progress against deadlines, and help you manage your control testing lifecycle.

Download the White Paper
Leveraging GRC for PCI DSS Compliance

Compliance-Icon

 

Compliance

There are a variety of compliance guidelines and frameworks to which organizations are required (or choose) to comply. Without an adequate tool, the tasks can be overwhelming, particularly if you import multiple versions of the rules and associated controls.

Keylight provides the capability to import various compliance docs, and generate a (1) comparison to determine the controls that satisfy multiple controls, eliminating redundant work; and (2) a gap analysis to determine those requirements that require additional controls and/or supporting documentation.

One example of a compliance framework is ISO 31000, which consists of 3 main components: principles, framework, and process. The principles provide guidance on how to build an effective risk management program; the framework provides the roadmap for designing, implementing, and improving that program; and the process provides a template for the risk management process itself. All of these components have a place, to varying degrees, within a GRC program and platform. The question, then, is where they best fit into the big picture, particularly as it relates to Keylight.

Download the White Paper
Enabling ISO/IEC 31000 Adoption with the LockPath Keylight Platform

Security-Icon

 

Security

Managing vulnerability data is messy. To make matters worse, the larger your organization and the longer it’s been conducting vulnerability scans, the more likely it is that multiple scanners are in use. This often means trying to manually correlate disparate data formats to provide management with a reasonably complete picture. To top it off, each vulnerability scan vendor has its own rating scale for findings, making it more difficult to de-duplicate and correlate findings.

Even if your organization has found a method to manage the chaos, there are other challenges to consider. How well do your vulnerability scan findings map to assets? How easy is it to track remediation activities? Do your findings tie back to security requirements or your controls framework? From an operational perspective, finding and patching identified weaknesses is important. But from a risk management perspective it is also important to understand the relative risk of the findings and how the potential exposure may impact the business.

Keylight can help aggregate and correlate disparate vulnerability data sets, tying that information to assets, controls and policies. The platform can also reduce the burden of tracking remediation activities, as well as improve overall reporting to suit both the needs of operations and risk management.

Download the White Paper
Building a Better Vulnerability Profile

Vendor-Icon

 

Vendor Management

Every company uses outside vendors to support their business practices. Building a strong relationship with your vendors strengthens the organization’s performance in the marketplace. Keylight’s vendor management app allows you to rate prospective new vendors based on pre-determined criteria, to minimize the risk related to approving new vendors. The result is better quality, reduced costs, and increased customer satisfaction.

The ProServ team has worked with clients across industries to develop automated workflows to:

  • Gather vendor profile information (via questionnaires from vendor contacts)
  • Send assessments during on-boarding
  • Build risk ratings to calculate vendor risk
  • Construct vendor tables that house information (such as shipping times, quality of service) for future monitoring
  • Build dashboards that generate real-time information for management review.

Download the Lifecycle Guide
Third-Party Risk Management

Support Services

LockPath Support Services is focused on providing our Customers with fast, reliable solutions to any break/fix issues that may arise while using the Keylight platform. Our staff understands that every issue is unique, and we are committed to delivering personalized, live support, for each and every issue that may arise.

Each issue submitted by you and your organization is reviewed and assigned to a live Support Analyst, who in turn, partners with you to best understand the issue, and provide the best available resolution in the shortest time frame possible. Our staff utilizes various methods to ensure we capture all relevant information, and may ask for screen shots, participation in remote sessions, etc… to facilitate quicker resolution time frames.

We proactively follow up with you regarding your issues and will never close out a case until we receive verification that we have fully met your needs.

The following table should be referenced for priority definitions and communication expectations. In all cases, we strive to deliver service that exceeds what is listed below.

Please note: Any product customization requests or customer implemented customizations not implemented by LockPath Professional Services may be reviewed and deemed billable to implement.

Education Services

Our Education curriculum provides a strong foundation of knowledge and understanding of the Keylight Platform, applications, and core elements inherent in the product. In addition to our standard training programs that cover our out-of-the-box solutions, our trainers work closely with the Professional Services team to provide advanced training specific to how users have configured the platform.

Keylight Fundamentals

This program prepares administrators for setting up the Keylight platform through its core components. Attendees will develop an understanding of how these core components are leveraged in each application. This course is available as a classroom or virtual classroom format.

Upon completion of this program, you will be able to:

  • Establish platform security, create users, and manage component permissions
  • Manage record creation and form design through table management
  • Develop workflows to store and manage records through their lifecycle
  • Design assessment templates to capture responses based on compliance and risk Create reports that display the relevant data for an application
  • Produce dashboards that present key insights to an organizations processes


Register for Keylight Fundamentals

LockPath, Inc. is committed to your success. We know that offering a variety of training options is vital to your investment in the Keylight platform. Look no further, we’ve got you covered.

Our programs include a variety of skill levels from beginner to advanced, with delivery methods that suit your budget and timeline. Based on each customer’s need, the Education Services team will work to create an effective training plan to ensure success.

Classroom

Attend training at LockPath headquarters. These sessions allow attendees to meet the LockPath team and interact with other Keylight users. You’ll enjoy a rich learning experience that extends beyond the classroom.

If you can’t come to us, we’ll come to you. For more information, contact training@lockpath.com.

Virtual

Attend a course from the comfort of your desk. With video conferencing, hands-on exercises in our Keylight training environment, learning is right at your fingertips. These sessions follow a similar format to our traditional classroom courses, but without the hassles of travel.

If you have a geographically dispersed team, a private virtual training might be the perfect solution. We follow our standard virtual processes, but the only attendees will be your team. For more information, contact training@lockpath.com.

eLearning

Through our eLearning content, you’ll find quick how-to videos, engaging interactive courses, and bundled courses (our learning path) that can lead to certification or a better understanding of process and functionality.

Our Learning Portal is your window into your learning growth. Register for learning and view your progress. As a team leader, you can view your team’s learning progress through dashboards and assign courses to your team.

Becoming a Keylight Certified Professional (KCP) provides many business benefits to individuals and their employer. Certification instantly communicates an individual’s ability to configure and administer the Keylight platform in support of a Governance, Risk and Compliance program and associated business processes.

Certification Requirements

An individual must have a foundational understanding of the core applications and demonstrate an ability to navigate the platform and configure processes.

Certification Path

Individuals must attend our core training courses and pass the certification exam.

  • Foundations: a high-level Keylight beginner course delivered via eLearning.
  • Fundamentals: administrator platform course delivered via classroom or virtual.
  • Certification Exam: a two-part assessment.
    • An electronic written test
    • Case study exercise, that includes formal objectives and process creation instructions

Certification Renewal

The KCP individual is certified annually with expiration on December 31 of the year the individual became certified. Certifications obtained 90-days before the end of the calendar year, roll into the next year.

After the expiration date, there is a 90-day grace period to re-certify. After which the individual must complete an updated version of the certification exam.

Registration

Access the LockPath Learning Portal to register for certification. Click here.
For additional details regarding the exam or training, contact training@lockpath.com.

Keylight Managed Services

Contact Us