API: GET: Company Details [/v1/companies/company_guid
Options
Vendor Access
Use the Vendor Access button at the top-right to invite the selected organization to collaborate via the Client/Vendor Access Program or view previous collaboration.
Reports and Assessments
- Executive Report
- Present a high-level overview of a company’s cybersecurity posture to non-technical and executive stakeholders, including company leadership, board members, investors, and shareholders.
- Download Company Report
- An overview of your security performance, a summary of the findings, and comparisons to industry averages.
- Company Preview Report
- Compare a selected organization to its industry peers and provides indications for how the organization is performing in relation to the risk vectors during the last quarter.
- Download Risk Summary Report
- Highlights the worst performing, critical areas for this vendor relative to Bitsight-recommended peers.
- NIST CSF Report
- Get a high-level summary of your compliance with the US National Institute of Standards and Technology's cybersecurity Framework using our risk vectors and existing data as evidence.
- ISO/IEC 27001 Report
- Get a high-level summary of your compliance with ISO/IEC 27001:2013 using security ratings, risk vectors, and data as supporting evidence for compliance.
- Assessments
- Understand security controls and procedures to comply with both internal and regulatory requirements.
Actions
Use the Actions dropdown at the top-right to complete any of the following actions:
- Add/View Notes
- Access your company notes about this company.
- Compare
- Do a comparison for this vendor.
- Add to Folder
- Add this vendor to a folder.
- Edit Tier
- Edit this vendor’s tier.
- Unsubscribe
- Unsubscribe from this vendor.
- Bitsight for 4th Party
- Service Providers
- See this vendor’s service providers.
- Products
- See products used by this vendor.
Dashboard
The dashboard provides an overview of:
- The vendor’s rating gauge, their rating category, and any rating designations.
- The likelihood of breach and ransomware compared to the median rating of similar companies. Like peer groups, similar companies are identified as those in the same industry, sub-industry, have a similar employee count, and the number of services they provide.
- A timeline of security ratings and breaches.
- The Program Area Risk section shows a subset of risk vectors grouped by program area. Each risk vector is assigned a threshold based on measured correlation to risk of breach.
Panels
- Vulnerability Detection
- Access and manage vulnerabilities and exposures.
- Asset Geolocation
- Shows the concentration of critical/high importance assets across the globe. To view assets, select View All Assets or select a specific country in the map.
- 4th Party Risk
-
- The number of service providers and products.
- The service providers’ median rating.
Vendor Information
The Company Information sheet on the right contains information on the vendor's company, relationship details, and your company notes.
- May 13, 2024: Defined similar companies that are used for the likelihood of breach and ransomware comparison.
- February 5, 2024: Asset Geolocation.
- September 19, 2023: Published.
Feedback
0 comments
Please sign in to leave a comment.