TrustCloud
trustcloud.ai
As a Trust Assurance platform, TrustCloud® uses a unified, graph-based architecture that connects your controls, policies, and knowledge base into one silo-free compliance automation and risk management platform. We help compliance teams: - Reduce cost and time managing controls and preparing for audits - Accelerate sales deals with faster security reviews - Manage and quantify risk We help CISOs: - Reduce corporate and personal liability - Programmatically measure and report on control status, compliance audits, customer commitments, and risk - Become strategic partners to the board and leadership TrustCloud is a fast, affordable, and accurate compliance and risk management platform that dynamically scopes to your objectives as regulations change and your business grows.
Scytale
scytale.ai
Scytale is the global leader in compliance automation, helping companies get compliant and stay compliant with security frameworks like SOC 1, SOC 2, ISO 27001, HIPAA, GDPR , PCI-DSS and more, without breaking a sweat. Our experts offer personalized guidance to streamline compliance, enabling faster growth and boosting customer trust. Scytale is the only complete compliance hub including other key solutions, such as penetration testing and AI security questionnaires.
Cyble
cyble.ai
Cyble is one of the fastest-growing threat intelligence provider. Cyble provides the fastest and most comprehensive coverage across adversaries, infrastructure, exposure, weaknesses, and targets. Cyble empowers governments and enterprises to safeguard their citizens and infrastructure by providing critical intelligence in a timely manner and enabling rapid detection, prioritization, and remediation of security threats through its advanced capabilities for data analysis, expert insights, and automated processes.
Detectify
detectify.com
Complete External Attack Surface Management for AppSec & ProdSec teams, Start covering your external attack surface with rigorous discovery, 99.7% accurate vulnerability assessments, and accelerated remediation through actionable guidance, all from one complete standalone EASM platform.
Securiti
securiti.ai
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, "Most Innovative AI Companies" by CB Insights, "Cool Vendor in Data Security" by Gartner, and "Privacy Management Wave Leader" by Forrester.
Whistic
whistic.com
The Whistic platform gives InfoSec teams the power to run world-class third-party risk management and customer trust programs with a unified, AI-powered experience that streamlines both sides of the vendor risk assessment process. Enable a Custom TPRM Program Easily manage all aspects of a third-party risk program and significantly reduce your company’s potential for a costly data breach. Meet regulatory compliance and audit requirements in a simple, automated process. Manage and Share Your Trust Center Substantially reduce inbound questionnaire response requests: manage all of your security and compliance information from one place, making it fast and easy to search, publish, share, and confidently meet a customer’s assessment requirements. AI-First TPRM The Whistic Platform integrates AI into every stage of the TPRM assessment process, making it possible to automate up to 90% of manual tasks and take assessment times from days or weeks to minutes. Whistic AI: —Automatically runs your preferred standard or questionnaire against all existing vendor documentation to accelerate the assessment process. —Provides control-specific summaries of lengthy security docs like SOC 2 reports at the push of a button. —Allows you to send bulk queries to your entire vendor inventory to surface insights. One-of-a-Kind Network Whistic’s Trust Catalog offers the industry’s most robust network where vendors and their customers can connect and seamlessly exchange on-demand security and compliance information, eliminating the need for a manual assessment. Access to 50+ Questionnaires and Frameworks Leverage the latest versions of more than 50 questionnaires and frameworks, including rapid response templates for industry-wide vulnerabilities, plus continuous monitoring by RiskRecon on over 60k companies — all included with your Whistic subscription.
Smarsh
smarsh.com
Smarsh enables companies to transform oversight into foresight by surfacing business-critical signals in their digital communications. Regulated organizations of all sizes rely upon the Smarsh portfolio of cloud-native digital communications capture, retention, and oversight solutions to help them identify regulatory and reputational risks within their communications data before those risks become fines or headlines. Smarsh serves a global client base spanning the top banks in North America, Europe, and Asia, along with leading brokerage firms, insurers, and registered investment advisors and U.S. state and local government agencies.
SwordEye
swordeye.io
In late 2018, it developed the first product that provides one-time digital asset issuance, called SwordEye Recon. In this process, it served dozens of customers until 2020. Thanks to the feedback received from customers, it started to develop a new product that constantly monitors digital assets, gives alarms when necessary, and automatically discovers all sub-products and services connected to the domain. With the investment it received in the first quarter of 2020, it developed the SwordEye Attack Surface Monitoring product and started to offer a product that gives a risk letter grade with a unique risk score algorithm that explains the importance of the attack surface and offers solutions.
Deepinfo
deepinfo.com
Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive threat intelligence solutions, data, and APIs to top-notch cybersecurity companies. Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action. An all-in-one web security monitoring solution to empower your organization's cyber security.
Cybersixgill
cybersixgill.com
Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward a few years and our agile, automated threat intelligence solutions are helping security teams fight cyber crime and minimize their risk exposure by detecting phishing, data leaks, fraud and vulnerabilities, while amplifying incident response – all in real-time. Our rapidly growing customer community includes enterprises, financial services organizations, government and law enforcement entities around the globe. We have also secured a number of technology alliances and partnerships with leading organizations. Today, Cybersixgill has over 100 employees in Israel, North America, EMEA and APAC.
Ceeyu
ceeyu.io
The Ceeyu SaaS platform periodically performs automated scans and risk analysis of the digital footprint of companies (aka Attack Surface Management or ASM) and their suppliers or partners (aka Third Party Risk Management). Because not all security risks can be identified in an automated manner, Ceeyu also offers the possibility to carry out questionnaire-based audits. This can be done by creating questionnaires tailored to the supplier, from a white sheet or starting from templates that Ceeyu makes available. The completion of the questionnaire by the supplier and the follow-up of the process by the customer is done in a secure environment on the same SaaS platform. This enables a simple, central follow-up, entirely online and without the intervention of third parties. The closed platform guarantees the confidentiality of the survey, since only authorized persons have access to the application.
Red Sift
redsift.com
Red Sift enables organizations to anticipate, respond to, and recover from cyber attacks while continuing to operate effectively. The award-winning Red Sift application suite is the only integrated solution that combines four interoperable applications, internet-scale cybersecurity intelligence, and innovative generative AI that puts organizations on a robust path to cyber resilience. Red Sift is a global organization with offices in North America, Australia, Spain, and the UK. It boasts a global client base across all industries, including Domino’s, ZoomInfo, Athletic Greens, Pipedrive, and top global law firms. Red Sift is also a trusted partner of Entrust, Microsoft, Cisco and Validity, among others. Learn more at redsift.com.
Informer
informer.io
Informer's External Attack Surface Management (EASM) and Pen Testing platform help CISOs, CTOs and IT teams map external assets and identify vulnerabilities in real time so they can be remediated before attackers can exploit them. The Informer.io platform provides 24/7, 365 automated security monitoring that helps you assess the risks relating to known and unknown assets, so you can take immediate action to protect and secure your valuable data. Integrated pentesting enables our team of ethical hackers to enhance automated security testing using manual pentesting for a more in-depth and detailed vulnerability assessment. Combining the power of automation and manual security testing we help our clients continuously map their attack surface, manage vulnerabilities, and remediate faster. Informer is a CREST accredited company operating at the highest security testing standards with a constant push to keep innovating.
Halo Security
halosecurity.com
Security testing for the modern attack surface. Our agentless vulnerability scanning and discovery solutions, combined with manual penetration testing services, help thousands of organizations gain full visibility into the risk posture of their websites and applications.
Maltego
maltego.com
Maltego is the world’s most used all-in-one intelligence platform for complex cyber investigations. It has empowered over one million investigations worldwide since 2008. Maltego empowers investigators worldwide to accelerate and simplify their investigations through link analysis. It is the all-in-one tool with easy data integration in a single interface, powerful visualization and collaborative capabilities to quickly zero in on relevant information. Maltego is used by a broad audience, from security professionals and pen testers to forensic investigators, investigative journalists, and market researchers. Headquartered in Munich, Maltego has grown to over 100 employees in Germany and works with customers including the Federal Bureau of Investigations, INTERPOL, and major tech and service companies including half of the DOW 30.
Glasstrail
glasstrail.com
Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard and get alerts sent to your tool of choice - so you can focus on remediation. “Previously, we didn’t have the whole picture of our information security risks. With Glasstrail, we have a tool that locates vulnerabilities, tells us whether it’s a high-priority risk, and allows us to protect our data and systems. It’s a very efficient way to find risks as the intelligence built into Glasstrail does all the work.” Chief Security Officer, Teaching Council.
Cavelo
cavelo.com
Cavelo is an Attack Surface Management (ASM) platform, with a proactive focus on minimizing and mitigating risk before a breach occurs. Cavelo empowers MSPs to proactively reduce their customers' cyber risk and liability. Its consolidated attack surface management platform combines sensitive data and asset discovery, access management, and risk-based vulnerability management to simplify governance and compliance initiatives and risk remediation. Cavelo helps businesses proactively reduce cybersecurity risk and achieve compliance with automated data discovery, classification and reporting. Its cloud compatible data protection platform continuously scans, identifies, classifies and reports on sensitive data across the organization, simplifying compliance reporting and risk remediation.
Enactia
enactia.com
Comprehensive software solution for Cybersecurity and Data Protection Governance Risk Compliance (GRC). Support your business addressing compliance and governance challenges with multiple Data Protection ad Cybersecurity Laws and Frameworks from multiple jurisdictions across the world, including GDPR, CCPA, PDPL, HIPPA, PIPEDA, ISO27001, NIST CSF, SAMA and much more Regulations/Standards. Enactia is a governance, risk management, and compliance (GRC) suite of solutions, which enables businesses to manage compliance, data breach, incidents, tasks and risks using assessments. Professionals can store investigation reports, policies, supporting evidence and other documents within a centralized repository. Key features of Enactia include audit trail, reminders, role-based access permissions, predefined templates and vendor management. Businesses can create compliance assessments, delete, edit or add questions and perform data protection impact assessments (DPIAs). Additionally, organizations can assess compliance with various regulations such as California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR), among others. Using Enactia, businesses can access information about specific documents, answers, tasks and risks from within a unified platform. The product is available on monthly or annual subscriptions and support is extended via phone and other online measures.
Trickest
trickest.com
Trickest provides an innovative approach to offensive cybersecurity automation and asset and vulnerability discovery. Its platform combines extensive adversary tactics and techniques with full transparency, hyper customization, and hyper scalability, making it the go-to platform for offensive security operations.
CyCognito
cycognito.com
CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCognito scans billions of websites, cloud applications, and APIs to identify potential vulnerabilities and critical risks. This proactive approach enables organizations to address security concerns before they can be exploited by malicious actors, thereby enhancing their overall security posture. The target audience for CyCognito includes emerging companies, government agencies, and Fortune 500 organizations, all of which face increasing threats in today's digital environment. These entities require robust security measures to protect sensitive data and maintain compliance with various regulations. CyCognito serves as an essential tool for security teams, providing them with the insights needed to understand their risk exposure and prioritize remediation efforts effectively. One of the key features of the CyCognito platform is its comprehensive scanning capability, which covers a vast range of digital assets. This extensive reach ensures that organizations can identify vulnerabilities across all their online presence, including third-party services and shadow IT. The platform's AI-driven analysis further enhances its effectiveness by automatically assessing the severity of identified risks, allowing security teams to focus on the most critical issues that could lead to significant breaches. In addition to risk discovery, CyCognito offers actionable guidance for remediation, helping organizations to implement effective security measures. The platform provides detailed insights into the nature of the vulnerabilities and suggests specific steps to mitigate them. This feature not only streamlines the remediation process but also empowers organizations to build a more resilient security framework over time. By integrating CyCognito into their cybersecurity strategy, organizations can significantly reduce their risk exposure and enhance their ability to respond to emerging threats. The platform's unique combination of extensive scanning, AI-driven risk assessment, and actionable remediation guidance positions it as a valuable asset for any organization looking to strengthen its security posture in an increasingly complex threat landscape.
ResilientX
resilientx.com
ResilientX Security is a fast-growing Cyber Security company that helps organizations of all sizes identify, quantify and manage their cyber risks and cyber exposure. At ResilientX, we are committed to delivering state-of-the-art security solutions to help organizations safeguard their digital assets and maintain compliance. Our First-Party and Third-Party Risk and Exposure Management platform is designed for those who take security and compliance seriously.
runZero
runzero.com
runZero delivers the most complete security visibility possible, providing organizations the ultimate foundation for successfully managing risk and exposure. Rated number one on Gartner Peer Insights, their leading cyber asset attack surface management (CAASM) platform starts delivering insights in literally minutes, with coverage for both managed and unmanaged devices across the full spectrum of IT, OT, IoT, cloud, mobile, and remote assets. With a world-class NPS score of 82, runZero has been trusted by more than 30,000 users to improve security visibility since the company was founded by industry veterans HD Moore and Chris Kirsch. To discover the runZero Platform for yourself, start a free trial today or visit the website.
VISO TRUST
visotrust.com
A rationalized vendor security due diligence platform. VISO TRUST puts reliable, comprehensive, actionable vendor security information directly in the hands of decision-makers who need to make informed risk assessments.
Supply Wisdom
supplywisdom.com
Supply Wisdom transforms global business with comprehensive, predictive, real-time risk intelligence. Through continuous monitoring, comprehensive intelligence reports, and real-time alerts, Supply Wisdom speeds business growth, lowers costs, increases security and compliance, and unlocks revenue opportunities. Supply Wisdom’s full-stack AI-based SaaS products turn open-source data into risk intelligence and are the market’s only software to cover all risk domains in real-time: financial, cyber, operational, ESG, compliance, Nth party, and location-based risk. Supply Wisdom clients include Fortune 100 and Global 2000 firms in the financial services, insurance, healthcare, and technology sectors, including United Healthcare, BNY Mellon, and Bank of Ireland. Supply Wisdom values diversity with a global workforce that is currently 57% female. Contact us today for a quick demo so you can see how our actionable approach can achieve great results for your company.
Risk Ledger
riskledger.com
Risk Ledger is a cybersecurity and risk management platform designed to help organisations securely share risk data with their supply chains. This solution addresses the pressing need for businesses to effectively identify, assess, and manage third-party risks while ensuring compliance with various industry standards. By streamlining the risk management process, Risk Ledger empowers organisations to maintain operational integrity and safeguard sensitive information. Aimed at organisations with complex supplier networks, Risk Ledger offers a centralised system for conducting comprehensive risk assessments and sharing vital data. Sectors such as finance, healthcare, and manufacturing benefit greatly from the platform's insights into third-party vendor risk profiles. These insights help businesses bolster operational resilience and protect against potential breaches or vulnerabilities from supply chain partners. Risk Ledger’s customisable risk assessment tool allows organisations to tailor evaluations to their specific needs, meeting various regulatory requirements. The platform’s collaborative network enables real-time communication and data sharing, ensuring all stakeholders remain informed and engaged. This approach enhances the effectiveness of risk assessments and promotes transparency. One major advantage of Risk Ledger is its ability to improve supply chain transparency and accountability. By providing a shared platform for risk data, organisations can build trust and foster collaboration with their partners, leading to more informed and proactive decision-making. The platform’s strong focus on compliance also helps organisations meet regulatory obligations, reducing the risk of penalties and strengthening their reputation. Risk Ledger is an essential tool for navigating the complexities of third-party risk management. Its combination of collaborative features and robust assessment capabilities makes it a valuable asset for businesses aiming to enhance their cybersecurity measures and mitigate supply chain risks, creating a more secure and resilient operational framework.
UpGuard
upguard.com
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.
6clicks
6clicks.com
Transform your approach to cyber risk and compliance with 6clicks, a leading AI-powered Governance, Risk & Compliance (GRC) platform. Designed for service providers, enterprises and governments, 6clicks streamlines building resilient cyber programs that go beyond tick-box compliance. Our unique Hub & Spoke deployment model and powerful AI engine connect distributed teams, systems, and data, providing comprehensive oversight and control.
Socurely
socurely.com
Socurely is a All-in-One GRC solution for Security and Privacy framework compliance automation like SOC2, ISO 27001, GDPR, HIPPA, NIST, and many more. We've redefined the approach to compliance, making it seamless, time-efficient, and automated. No longer do you need to grapple with endless manual checks, costly IT consultants, or fear audit uncertainties. Socurely's AI powered solutions provide everything you need from first steps to on-going to put InfoSec and compliance on auto-pilot to build trust and unlock revenue growth.
Venminder
venminder.com
Venminder is a market leader in third-party risk management solutions. Venminder caters to the complex requirements of third-party risk management with robust solutions and expert guidance. The market-leading provider hones its solutions to address the evolving needs of risk management across various industries, servicing customers from startups to Fortune 100 organizations. Venminder's cutting-edge platform offers a centralized space for comprehensive third-party risk management. The third-party risk management software includes but is not limited to vendor onboarding and offboarding, document storage, contract and SLA tracking, questionnaire management, risk assessments, workflow creation, and comprehensive reporting. This versatility allows organizations to customize and streamline the risk management of suppliers, vendors, and third parties. Venmonitor™ is one of Venminder's standout risk intelligence solutions, designed to revolutionize third-party screening. It empowers customers to quickly screen potential or current third parties across multiple risk domains with less manual activities and without the need for direct involvement with the suppliers. With Venmonitor™, organizations gain deeper insight into crucial areas such as cybersecurity, business health, privacy, Know Your Vendor, and more. Thanks to daily refresh capabilities, users are equipped with continuous and up-to-date monitoring, ensuring that they remain ahead of any potential risks. Vendiligence™, another Venminder solution, is an outsourced service that performs on-demand control assessments on vendors, such as information security, data protection, cybersecurity, and financial health. Venminder's team of highly qualified experts includes CISSPs, CPAs, financial risk analysts, paralegals, and more. Available in an extensive online library, these risk-based assessments facilitate identifying and understanding potential risks and strengths related to vendors' information security posture, privacy standards, SOC reports, financial viability, business continuity/disaster recovery preparedness, contractual standards, and regulatory compliance. Venminder’s services also include vendor document collection, relieving customers of the cumbersome task of chasing paperwork. Additionally, their expert advisory services assist customers in aligning their third-party risk management policies and procedures with leading industry standards. Venminder is more than a solution provider; they are a knowledge hub for the industry. Venminder’s experienced professionals frequently contribute to industry conversations at conferences through educational content and hosting CPE credit-eligible webinars. Venminder also offers Third Party ThinkTank, the world’s largest online networking community dedicated to third-party risk professionals to share insights and best practices.
Inventive AI
inventive.ai
Inventive is an AI-powered RFP & Questionnaire Response Management platform that drives 70%+ efficiency in response workflows. Core features of Inventive are: + 10X Faster Drafts With Highly Accurate Responses (get v1 drafts in minutes) + Single Hub for All Your Knowledge Sources (add docs, QnA, integrations with gDrive/Sharepoint) + Fight Stale Content With AI Content Manager (save time with AI-assisted content management) + Higher Productivity & Competitive Advantage With AI Agents
© 2025 WebCatalog, Inc.