Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The Black Kite RSI employs a systematic approach that includes examining, converting, and modeling data gathered from a range of open-source intelligence (OSINT) channels, such as internet-wide scanners, hacker forums, and the deep or dark web, among others. By leveraging this data alongside machine learning techniques, it uncovers correlations among control items to generate reliable approximations. This process is operationalized through a platform designed to seamlessly integrate with various tools, including questionnaires, vendor management systems, and established process workflows. Moreover, it automates compliance with cybersecurity regulations, thereby mitigating the risk of breaches through a robust defense-in-depth strategy. The platform capitalizes on Open-Source Intelligence (OSINT) and non-intrusive cyber scans to detect possible security threats without ever engaging directly with the target customer. It identifies vulnerabilities and attack patterns across 20 distinct categories and over 400 controls, positioning Black Kite as three times more thorough than its competitors in the industry, thereby ensuring a deeper level of security and risk assessment. This comprehensive approach not only enhances security measures but also fosters greater confidence in safeguarding sensitive information.

Description

Ceeyu specializes in identifying vulnerabilities within your company's IT infrastructure and supply chain (Third Party Risk Management or TPRM) by integrating automated digital footprint mapping, comprehensive attack surface scanning, and thorough cybersecurity risk assessments, complemented by online questionnaire-based evaluations. By revealing your external attack surface, Ceeyu empowers organizations to detect and manage cybersecurity risks proactively. An increasing number of security breaches originate from your company’s digital assets, which include not only traditional network devices and servers but also cloud services and organizational intelligence accessible online. Cybercriminals exploit these components of your digital footprint to infiltrate your network, rendering firewalls and antivirus solutions less effective. Moreover, it is essential to identify cybersecurity risks present in your supply chain. Many cyber-attacks and GDPR violations can be linked to third parties with whom you share sensitive data or maintain digital connections, emphasizing the need for vigilance in these relationships. By addressing these vulnerabilities, your company can enhance its overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

No images available

Integrations

Blink
C1Risk
Captain Compliance
OneTrust Third-Party Management
Onspring

Integrations

Blink
C1Risk
Captain Compliance
OneTrust Third-Party Management
Onspring

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

€195/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Black Kite

Founded

2016

Country

United States

Website

blackkite.com

Vendor Details

Company Name

Ceeyu

Founded

2020

Country

Belgium

Website

www.ceeyu.io

Alternatives

Alternatives

BitSight Reviews

BitSight

Bitsight