Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Leverage the leading security ratings platform to make informed decisions that minimize cyber risk. BitSight is recognized for its extensively utilized Security Ratings solution, aiming to transform global approaches to cyber risk management. By offering dynamic, data-driven insights into an organization's cybersecurity effectiveness, BitSight utilizes objective and verifiable data, ensuring that measurements are both substantial and validated by a reputable, independent entity. The BitSight framework for Security Performance Management empowers security and risk professionals to adopt a risk-centric and results-oriented methodology in overseeing their cybersecurity initiatives. This encompasses comprehensive assessment, ongoing monitoring, and meticulous planning and forecasting, all designed to significantly lower cyber risk exposure. With BitSight, organizations can enhance their confidence in making swift and strategic decisions regarding cyber risk management. Ultimately, this proactive stance fosters a more resilient cybersecurity posture in an ever-evolving threat landscape.

Description

Ceeyu specializes in identifying vulnerabilities within your company's IT infrastructure and supply chain (Third Party Risk Management or TPRM) by integrating automated digital footprint mapping, comprehensive attack surface scanning, and thorough cybersecurity risk assessments, complemented by online questionnaire-based evaluations. By revealing your external attack surface, Ceeyu empowers organizations to detect and manage cybersecurity risks proactively. An increasing number of security breaches originate from your company’s digital assets, which include not only traditional network devices and servers but also cloud services and organizational intelligence accessible online. Cybercriminals exploit these components of your digital footprint to infiltrate your network, rendering firewalls and antivirus solutions less effective. Moreover, it is essential to identify cybersecurity risks present in your supply chain. Many cyber-attacks and GDPR violations can be linked to third parties with whom you share sensitive data or maintain digital connections, emphasizing the need for vigilance in these relationships. By addressing these vulnerabilities, your company can enhance its overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

No images available

Integrations

3rdRisk
Akitra Andromeda
Armis
Axonius
Blink
C1Risk
Lucidum
OneTrust Privacy Automation
OneTrust Third-Party Management
Onspring
Optiv Managed XDR
Panaseer
Polarity
Recorded Future
ServiceNow Integrated Risk Management
SureCloud
Tromzo
Trustwave DbProtect

Integrations

3rdRisk
Akitra Andromeda
Armis
Axonius
Blink
C1Risk
Lucidum
OneTrust Privacy Automation
OneTrust Third-Party Management
Onspring
Optiv Managed XDR
Panaseer
Polarity
Recorded Future
ServiceNow Integrated Risk Management
SureCloud
Tromzo
Trustwave DbProtect

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

€195/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

BitSight

Founded

2011

Country

United States

Website

www.bitsight.com

Vendor Details

Company Name

Ceeyu

Founded

2020

Country

Belgium

Website

www.ceeyu.io

Product Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Alternatives

Alternatives