Posted on Sep 23, 2015
Today, we are proud to launch the first fully collaborative platform for closing the security loop with partners. Via the 'Invite a Vendor' function, customers can now directly share detailed Scorecard information with strategic partners, suppliers, and vendors. SecurityScorecard customers can speed up the time to remediation and resolution of the risks lurking in the partner ecosystem— and reduce the friction in partner security mitigation with independently-validated security data.
"The SecurityScorecard data and workflow is groundbreaking for managing enterprise risk," said Michael Bryzek, co founder and former CTO of Gilt Groupe about the new collaborative workflow. "The ability to collaborate with vendors directly from an independent, accurate security intelligence source allows us to simultaneously speed up verification of issues, and see them to resolution quickly and without conflict."
Vendor risk managers can benefit from faster risk validation and hassle-free remediation with partners and suppliers.
The new platform allows organizations to effectively augment the time consuming validation process by using cutting-edge security risk intelligence information to:
● Fix partner issues rapidly by closing the validation and verification loop.
● Take back control of data by enforcing and validating data protection standards across all third party environments.
● Ensure data is protected even when the data is not in your own network or is protected by another entity.
Our cutting edge, security-risk benchmarking platform is powered by the ThreatMarket™ security intelligence engine picking up 30 million daily risk signals and sensors that are filtered in to a business-ready dashboard.
Our platform grades the following categories:
1. Web Application Security
2. Network Security
3. Endpoint Security
4. Hacker Chatter
5. Social Engineering
6. DNS Health
7. IP Reputation
8. Patching Cadence
9. Password Exposure
10. Cubit Score™
Our non-intrusive platform allows you to see partner risks anytime you need them, and allows you to share that information privately and securely with third parties. Improve the efficiency of vendor risk management by easily adding hundreds or thousands of third-party partners and suppliers via one central, continuous platform to track and monitor security-based risk.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.