Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Do you have the data you need? We certainly do, extending all the way to the nth-tier. Access over a decade's worth of insights on supply chain disruptions and comprehensive supplier evaluations derived from both autonomous and human research methods. Regardless of whether challenges arise from labor disputes, cyber threats, financial instability, or natural calamities, you will have all the essential information regarding your suppliers at hand. By meticulously mapping your suppliers and their respective suppliers down to the nth-tier level, you can visualize your entire supply chain, allowing you to monitor potential vulnerabilities right down to specific sites and components. This proactive approach means that when a disruption occurs or is anticipated, you’ll be equipped with crucial information to make well-informed decisions in a matter of minutes. Disruptions are an inevitable part of business; thus, being among the first to know and act is vital. Our EventWatchAI cuts through the clutter to ensure your alerts are entirely relevant, while our dedicated team delivers thoroughly researched and actionable notifications. We tirelessly monitor millions of news articles and social media feeds every day, encompassing over 100 languages, ensuring you are always informed and ready to respond. Staying ahead of potential risks is not just advantageous; it’s essential for modern supply chain management.
Description
The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.
API Access
Has API
API Access
Has API
Integrations
Akitra Andromeda
Mindflow
OneTrust Third-Party Management
ServiceNow
Skypher
Slack
Stackreaction
UpGuard BreachSight
Zapier
Integrations
Akitra Andromeda
Mindflow
OneTrust Third-Party Management
ServiceNow
Skypher
Slack
Stackreaction
UpGuard BreachSight
Zapier
Pricing Details
$1,400 per month
Free Trial
Free Version
Pricing Details
$5,249 per year
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Resilinc
Founded
2010
Country
United States
Website
www.resilinc.com
Vendor Details
Company Name
UpGuard
Founded
2012
Country
United States
Website
www.upguard.com
Product Features
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Vendor Management
Audit Management
Contact Management
Customer Database
Self Service Portal
Supplier Master Data
Transaction History
Vendor Maintained Profiles
Vendor Managed Inventory
Vendor Performance Rating
Vendor Qualification Tracking
Product Features
Application Lifecycle Management
Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning