- April 12, 2023: Instructions for unsubscribing from a benchmarking company.
- February 7, 2023: Published.
The My Company List allows you to:
- View any subscribed entity within My Company.
- Organize companies into folders.
- Share your folders with colleagues.
- Search for companies affected by vulnerabilities or particular infections.
- Download portfolio reports & industry ratings, or company ratings.
|Add a company to a folder:
|Add multiple companies to a folder:
|Customize fields that are included in the table❖:
|Select the Customize Columns button at the top-right of the table.
|Download your Companies List (.csv):
|Select the Download button at the top-right.
|Refine your search:
If a company is not yet listed, submit a request to add that company to the Bitsight inventory (company request).
|Unsubscribe from a Benchmarking company:
|The name, logo, and link to the company’s company details.
|The primary industry sector of the company.
|The main website associated with the organization.
The company’s security rating, which is a number from 250-900 indicating their security performance.
The upper and lower edges of this range are currently reserved for future use. The current achievable range is 300-820.
|The more granular industry of the company.
|How your organization is subscribed to the company. Subscription types dictate the length of access and level of detail.
|A visual representation of the company’s Bitsight Security Ratings throughout the last one year.
|Available folders that contain SPM companies.
|Filter by subscription type.
|A number between 250 to 900 representing a company’s cybersecurity posture.
|Security ratings range.
|The company’s industry.
|Companies with at least one IP address that geolocates to the selected country.
|The type of Bitsight Security Rating Report.
|Risk Vector Grade
|How a company is performing in particular risk type.
|Letter grades A through F.
|Companies affected by selected infections.
|Companies that are affected by a particular flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system's security policy.
|Vulnerability name or Common Vulnerabilities and Exposures (CVE) identifier.
|Ports that are exposed to the Internet.
|Possible incidents of undesirable access to a company’s data.
|Find third parties that are using unsupported software (out-of-date, missing latest vendor updates). They are open to certain security risks until they update.
|Companies that handle or deliver services for other companies, such as web hosting, certificate signing, cloud infrastructure services, and email hosting.
|Service provider name.
|Products provided by a service provider.
|The category of the service provided by the service provider’s product.