We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.

Flexible Pricing Based on Your Needs

Decide how you want to manage your third-party cyber risks with our flexible packages. Speak to our team today and build the right plan for your business.

Continuous 360° Evaluation

External Attack Surface Assessments Continuous
Security Questionnaires
Combined Risk Rating
External Attack Surface Assessments
Customized Risk Rating
Business Risk Impact
Cyber Posture Assets Details
Continuous Vendor Risk Monitoring
Vendor Risk Alerts
Breach Alerts
Cyber News Insights
Real-Time Mapping of Cyber Events
Fourth and Nth-Party Discovery
Security Questionnaires
Customizable Questionnaires
Questionnaire Library
Questionnaire Autofill “Smart Match”
Automated Task Management
Response Validation
Questionnaire Workflows
Third-Party Cyber Risk Management
Vendor Risk Classification
Remediation Management
Remediation Task Workflows
Customized Reporting
In-Platform Communication
Audit Log
Third-Party Inventory Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations

Bi-Annual 360° Evaluation

External Attack Surface Assessments Bi-Annual
Security Questionnaires
Combined Risk Rating
External Attack Surface Assessments
Customized Risk Rating
Business Risk Impact
Cyber Posture Assets Details
Continuous Vendor Risk Monitoring
Vendor Risk Alerts
Breach Alerts
Cyber News Insights
Real-Time Mapping of Cyber Events
Fourth and Nth-Party Discovery
Security Questionnaires
Customizable Questionnaires
Questionnaire Library
Questionnaire Autofill “Smart Match”
Automated Task Management
Response Validation
Questionnaire Workflows
Third-Party Cyber Risk Management
Vendor Risk Classification
Remediation Management
Remediation Task Workflows
Customized Reporting
In-Platform Communication
Audit Log
Third-Party Inventory Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations

Continuous Posture Evaluation

External Attack Surface Assessments Continuous
Security Questionnaires
Combined Risk Rating
External Attack Surface Assessments
Customized Risk Rating
Business Risk Impact
Cyber Posture Assets Details
Continuous Vendor Risk Monitoring
Vendor Risk Alerts
Breach Alerts
Cyber News Insights
Real-Time Mapping of Cyber Events
Fourth and Nth-Party Discovery
Security Questionnaires
Customizable Questionnaires
Questionnaire Library
Questionnaire Autofill “Smart Match”
Automated Task Management
Response Validation
Questionnaire Workflows
Third-Party Cyber Risk Management
Vendor Risk Classification
Remediation Management
Remediation Task Workflows
Customized Reporting
In-Platform Communication
Audit Log
Third-Party Inventory Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations

Bi-Annual Posture Evaluation

External Attack Surface Assessments Bi-Annual
Security Questionnaires
Combined Risk Rating
External Attack Surface Assessments
Customized Risk Rating
Business Risk Impact
Cyber Posture Assets Details
Continuous Vendor Risk Monitoring
Vendor Risk Alerts
Breach Alerts
Cyber News Insights
Real-Time Mapping of Cyber Events
Fourth and Nth-Party Discovery
Security Questionnaires
Customizable Questionnaires
Questionnaire Library
Questionnaire Autofill “Smart Match”
Automated Task Management
Response Validation
Questionnaire Workflows
Third-Party Cyber Risk Management
Vendor Risk Classification
Remediation Management
Remediation Task Workflows
Customized Reporting
In-Platform Communication
Audit Log
Third-Party Inventory Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations

Smart Questionnaires

External Attack Surface Assessments
Security Questionnaires
Combined Risk Rating
External Attack Surface Assessments
Customized Risk Rating
Business Risk Impact
Cyber Posture Assets Details
Continuous Vendor Risk Monitoring
Vendor Risk Alerts
Breach Alerts
Cyber News Insights
Real-Time Mapping of Cyber Events
Fourth and Nth-Party Discovery
Security Questionnaires
Customizable Questionnaires
Questionnaire Library
Questionnaire Autofill “Smart Match”
Automated Task Management
Response Validation
Questionnaire Workflows
Third-Party Cyber Risk Management
Vendor Risk Classification
Remediation Management
Remediation Task Workflows
Customized Reporting
In-Platform Communication
Audit Log
Third-Party Inventory Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations
Continuous 360° Evaluation
Bi-Annual 360° Evaluation
Continuous Posture Evaluation
Bi-Annual Posture Evaluation
Smart Questionnaires
External Attack Surface Assessments Get a cyber posture rating with a breakdown of exposed assets and potential risks
Continuous
Bi-Annual
Continuous
Bi-Annual
Security Questionnaires Send and review security questionnaires at scale
Combined Risk Rating Get a unified risk score based on both External Attack Surface Assessments and Security Questionnaire responses
External Attack Surface Assessments
Customized Risk Rating Decide how much impact Cyber Posture Ratings and Questionnaire responses have on vendor’s overall risk score
Business Risk Impact Understand how significant a vendor’s risk is to your organization based on business relationship and inherent risk
Cyber Posture Assets Details Drill down into vendor’s discovered assets and review security findings
Continuous Vendor Risk Monitoring Get the most up-to-date, accurate view of changes to your vendors’ cyber posture
Vendor Risk Alerts Real-time alerts on critical findings and changes to vendor’s risk score
Breach Alerts Real-time alerts on breaches in your supply chain
Cyber News Follow dark web mentions and cyber news related to your vendors
Real-Time Mapping of Cyber Events Risk Insights Portal shows Nth parties affected by vulnerabilities and breaches in your supply chain
Fourth and Nth-Party Discovery Detect common fourth and fifth parties in your digital attack surface
Security Questionnaires
Customizable Questionnaires Create custom questionnaires based on your business goals
Questionnaire Library Select templates based on regulations and industry recommendations
Questionnaire Autofill “Smart Match” Seamlessly answer questionnaires with autocomplete options based on previous answers
Automated Task Management Send multiple questionnaires, manage deadlines and customize email templates
Response Validation Validate questionnaire responses based on data from External Attack Surface Assessments
Questionnaire Workflows Set up automations to approve or decline vendors based on questionnaire responses
Third-Party Cyber Risk Management
Vendor Risk Classification Prioritize vendors based on critical risks detected
Remediation Management Address the most critical findings first and instantly create remediation tasks
Remediation Task Workflows Assign teammates, deadlines, and tasks to remediate security gaps
Customized Reporting Create and share custom reports with external stakeholders
In-Platform Communication Communicate with internal and external stakeholders to resolve security gaps
Audit Log Track events, tasks and communications across your vendor’s lifecycle
Third-Party Inventory One place to keep track of all of your vendors’ assessments
Add On
Add On
Add On
Add On
Add On
Account Management and Integrations
Multi-Factor Authentication
SSO
API Access
Out-of-the-Box Integrations

The Fastest and Easiest Way
to Do Business Together, Securely