The Companies List (also known as your portfolio) contains your folders and subscriptions. It allows you to:
- Get deep insights into portfolio quality.
- Organize clients into folders.
- Share your folders with colleagues.
- Search for clients affected by vulnerabilities or particular infections.
- Download reports, industry ratings, or ratings.
- View any client in your portfolio.
|Customize included fields❖:
|Select the Customize Columns button.
|Download your Companies List (.csv):
|Select the Download button at the top-right.
|Refine your Companies List:
This column cannot be removed.
|The name of the organization.
|The primary industry sector of the company.
|The main website associated with the organization.
A number from 250 - 900 indicating the organization’s security performance.
The upper and lower edges of this range are currently reserved for future use. The current achievable range is 300-820.
|The more granular industry of the company.
|How your organization is subscribed to the company. Subscription types dictate the length of access and level of detail.
|A visual representation of the company’s Bitsight Security Ratings during the last year.
Use the following filters or select a filter set to refine your Companies List.
|Clients with at least 1 IP address that geolocates to the selected country.
|Clients in folders, categorized by their importance.
|The client’s industry.
|Clients affected by selected infections.
|Ports that are exposed to the Internet.
|Products provided by a service provider.
|The category of the service provided by the service provider’s product.
|Possible incidents of undesirable access to a client’s data.
|The type of Bitsight Security Rating.
|Risk Vector Grade
|How a company is performing in particular risk type.
|Letter grades A through F and N/A.
|A number between 250 to 900 representing a client’s cybersecurity posture.
|Security ratings range.
|Service providers handle or deliver services for other companies, such as web hosting, certificate signing, cloud infrastructure services, and email hosting.
|Service provider name.
|Find clients that are using unsupported software (out-of-date, missing latest vendor updates). They are open to certain security risks until they update.
|Filter by subscription type.
|Clients that are affected by a particular flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
|Vulnerability name or Common Vulnerabilities and Exposures (CVE) identifier.