Options
Company Access
Use the Company Access button at the top-right to invite the selected organization to collaborate via the Client/Vendor Access Program or view previous collaboration.
Reports and Assessments
- Executive Report
- Present a high-level overview of your company’s cybersecurity posture to non-technical and executive stakeholders, including company leadership, board members, investors, and shareholders.
- Download Company Report
- An overview of your security performance, a summary of the findings, and comparisons to industry averages.
- Company Preview Report
- Compare a selected organization to its industry peers and provides indications for how the organization is performing in relation to the risk vectors during the last quarter.
- Download Risk Summary Report
- Highlights the worst performing, critical areas for this company relative to Bitsight-recommended peers.
- NIST CSF Report
- Get a high-level summary of your compliance with the US National Institute of Standards and Technology's cybersecurity Framework using our risk vectors and existing data as evidence.
- ISO/IEC 27001 Report
- Get a high-level summary of your compliance with ISO/IEC 27001:2013 using security ratings, risk vectors, and data as supporting evidence for compliance.
- Assessments
- Understand security controls and procedures to comply with both internal and regulatory requirements.
Actions
Use the Actions dropdown at the top-right to complete any of the following actions:
- Add/View Notes
- Access your company notes about this company.
- Compare
- Do a comparison for this company.
- Add to Folder
- Add this company to a folder.
- Edit Tier
- Edit this company’s tier.
- Unsubscribe
- Unsubscribe from this company.
- Bitsight for 4th Party
- Service Providers
- See this company’s service providers.
- Products
- See products used by this company.
Dashboard
The dashboard provides an overview of:
- The company’s rating gauge, their rating category, and any rating designations.
- The likelihood of breach and ransomware compared to the median rating of similar companies. Like peer groups, similar companies are identified as those in the same industry, sub-industry, have a similar employee count, and the number of services they provide.
- A timeline of security ratings and breaches.
- The Program Area Risk section shows a subset of risk vectors grouped by program area. Each risk vector is assigned a threshold based on measured correlation to risk of breach.
Panels
- Vulnerability Detection
- Access and manage vulnerabilities and exposures.
- Asset Geolocation
- Shows the concentration of critical/high importance assets across the globe. To view assets, select View All Assets or select a specific country in the map.
- 4th Party Risk
-
- The number of service providers and products.
- The service providers’ median rating.
Company Information
The Company Information sheet on the right contains company information, relationship details, and your company notes.
- May 13, 2024: Defined similar companies that are used for the likelihood of breach and ransomware comparison.
- February 5, 2024: Asset Geolocation.
- September 19, 2023: Published.
Feedback
0 comments
Please sign in to leave a comment.