- Identify and prioritize the most critical assets within your third-party ecosystem.
- Quickly surface the risk you care about to third parties.
- Easily access your most important third-party assets all in one place.
Actions
Download Third Party Assets Data
Download the Third Party Assets data (.csv).
Filter the Data
Search Assets
Instructions: Use the search bar at the top-right to search by country, company name, and asset (name).
Unmonitor Assets
Instructions:
- Select the Unmonitor button at the top of the table.
- Select the Yes checkbox to confirm and proceed with unmonitoring the selected assets.
- Select Unmonitor.
Upload Assets to be Monitored
Upload assets to be monitored in bulk.
By uploading your file you agree to the Bulk Monitoring Disclaimer.
Instructions:
- Create a CSV file listing third party assets. Include the following columns with a maximum of 500 rows:
asset
= Identify the asset by IP address or domain name.company-guid
[entity_guid
] = Identify the company that should be attributed to the asset by their unique identifier. See GET: Portfolio Details.- Upload the file (drag & drop or select from your directory).
- Select Continue.
Vulnerability Evidence Details
View the Vulnerability Evidence Details sheet.
Instructions: Select an asset from the table.
Fields
- Asset
- The name of the asset.
- Asset Type
- The type of asset.
- Company
- The company that owns the asset.
- Country
- The country where the asset resides.
- Findings
- The number of findings in the asset.
- Importance
- The asset importance.
- Material/Severe Findings
- The number of material and severe assets.
Filters
- Asset Type
-
Filter by asset type.
Values: See asset types.
- Importance
-
Filter by asset importance.
Values: See asset importance.
- Number of Findings
-
Limit by the number of findings.
Values: The minimum & maximum number of findings to include.
- February 4, 2025: Published.
Feedback
0 comments
Please sign in to leave a comment.