Skip to main content
Bitsight Knowledge Base Help Center home page
Security Performance Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
  • Sign in
  • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Control Insights Data

Control Insights Data

  • Insights to Control Framework Mapping
  • Insights to Control Framework Mapping: Browser Configurations
  • Insights to Control Framework Mapping: Detected Services
  • Insights to Control Framework Mapping: Device Management
  • Insights to Control Framework Mapping: DNS Configurations
  • Insights to Control Framework Mapping: Email Configurations
  • Insights to Control Framework Mapping: File Sharing
  • Insights to Control Framework Mapping: Header Configurations
  • Insights to Control Framework Mapping: Malware Presence
  • Insights to Control Framework Mapping: Mobile Applications
  • Insights to Control Framework Mapping: Network Attack Surface
  • Insights to Control Framework Mapping: Potentially Unwanted Application & Software Presence
  • Insights to Control Framework Mapping: Software Configuration
  • Insights to Control Framework Mapping: Software Support
  • Insights to Control Framework Mapping: TLS/SSL Certificate Configurations
  • Insights to Control Framework Mapping: User Management
  • Insights to Control Framework Mapping: Vulnerability Management & Security Hygiene

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support