www.riskrecon.com Open in urlscan Pro
199.60.103.28  Public Scan

URL: https://www.riskrecon.com/
Submission: On November 07 via manual from AU — Scanned from AU

Form analysis 0 forms found in the DOM

Text Content

 * Blog
 * Academy
 * Login

 * Solutions
   
   * RiskRecon
   * RiskRecon Assessments
   * Threat Protection
   * Systemic Risk Assessment
   * My Cyber Risk
   * Onboard Risk Check
   
     FORRESTER REPORT: RISK RATINGS PLATFORMS DELIVER CRITICAL THIRD-PARTY RISK
     PROTECTION
     
     Benchmark your organization against leading TPRM programs and enhance your
     approach to cyber risks in the supply chain with a risk ratings solution.
     
     Read More
 * Use Cases
   
   * Third-party Portfolio Diagnostic & Prioritization
   * Cyber Supply Chain Monitoring & Visualization
   * Own Enterprise & Subsidiary Monitoring
   * Situational Awareness
   * Vendor Onboarding
   * Request for Proposal (RFP)
   * Mergers & Acquisitions
   * Vendor Due Diligence
   * Advanced Assessment Planning
   * Systemic Risk Assessment
   * SMB Risk Assessment
   * Merchant Risk Assessment
 * Company
   
   * Why RiskRecon
   * Our Story
   * Team
   * Careers
   * Contact Us
   
     FREE 3PTY RATINGS
     
     Get a free 30-day trial of the RiskRecon portal and see the ratings of up
     to 50 vendors.
     
     Read More
 * Partners
   
   * Alliance Partners
   * Channel Partners
 * Resources
   
   * RiskRecon Academy
   * Blog
   * Events
   * RiskRecon Ratings Model
   * RiskRecon Threat Intelligence
   * Reports & White Papers
   * Videos & Webinars
   
     BLOG: THE POWER OF RISK RATINGS PLATFORMS - DRIVING BETTER RISK DECISIONS
     
     Discover how risk ratings platforms can improve risk management decisions
     and drive better outcomes in today's evolving business landscape.
     
     Read More

Request a Demo
Free 3PTY Ratings

 * Solutions
   Main Menu
   Solutions
    * RiskRecon
    * RiskRecon Assessments
    * Threat Protection
    * Systemic Risk Assessment
    * My Cyber Risk
    * Onboard Risk Check
   
      FORRESTER REPORT: RISK RATINGS PLATFORMS DELIVER CRITICAL THIRD-PARTY RISK
      PROTECTION
      
      Benchmark your organization against leading TPRM programs and enhance your
      approach to cyber risks in the supply chain with a risk ratings solution.
      
      Read More

 * Use Cases
   Main Menu
   Use Cases
    * Third-party Portfolio Diagnostic & Prioritization
    * Cyber Supply Chain Monitoring & Visualization
    * Own Enterprise & Subsidiary Monitoring
    * Situational Awareness
    * Vendor Onboarding
    * Request for Proposal (RFP)
    * Mergers & Acquisitions
    * Vendor Due Diligence
    * Advanced Assessment Planning
    * Systemic Risk Assessment
    * SMB Risk Assessment
    * Merchant Risk Assessment

 * Company
   Main Menu
   Company
    * Why RiskRecon
    * Our Story
    * Team
    * Careers
    * Contact Us
   
      FREE 3PTY RATINGS
      
      Get a free 30-day trial of the RiskRecon portal and see the ratings of up
      to 50 vendors.
      
      Read More

 * Partners
   Main Menu
   Partners
    * Alliance Partners
    * Channel Partners

 * Resources
   Main Menu
   Resources
    * RiskRecon Academy
    * Blog
    * Events
    * RiskRecon Ratings Model
    * RiskRecon Threat Intelligence
    * Reports & White Papers
    * Videos & Webinars
   
      BLOG: THE POWER OF RISK RATINGS PLATFORMS - DRIVING BETTER RISK DECISIONS
      
      Discover how risk ratings platforms can improve risk management decisions
      and drive better outcomes in today's evolving business landscape.
      
      Read More

PHONE

801.758.0560

EMAIL

sales(@)riskrecon(.)com

Contact Us


FORRESTER REPORT: RISK RATINGS PLATFORMS DELIVER CRITICAL THIRD-PARTY RISK
PROTECTION

Benchmark your organization against leading TPRM programs and enhance your
approach to cyber risks in the supply chain with a risk ratings solution.

Read More

FREE 3PTY RATINGS

Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50
vendors.

Read More

BLOG: THE POWER OF RISK RATINGS PLATFORMS - DRIVING BETTER RISK DECISIONS

Discover how risk ratings platforms can improve risk management decisions and
drive better outcomes in today's evolving business landscape.

Read More


CYBERSECURITY RATINGS AND INSIGHTS THAT MAKE IT EASY TO UNDERSTAND AND ACT ON
YOUR RISKS.

Automated risk assessments tuned to match your risk appetite.

Free Ratings for up to 50 Vendors
Free Ratings for up to 50 Vendors
How it works


WEBINAR: UNLOCKING THE VALUE OF CYBER DEFENSE

Join us on November 6th for an exclusive webinar exploring Forrester's Total
Economic Impact™ Report on Mastercard Threat Protection.

Register for the webinar


LEADING RISKRECON USE CASES

THIRD-PARTY RISK MANAGEMENT

Organizations now largely entrust third parties with their most sensitive data
and operational functions. To help safeguard your digital ecosystem from
third-party risk, you need simple, real-time visibility of third-party partners’
cyber performance. Companies lacking this visibility cannot detect potential
threats and address them.



Learn More

SUPPLY CHAIN RISK

Catastrophic multi-party breach events show that cyber risk can originate in
supply chain layers beyond your immediate third parties. However, cybersecurity
analysts are less likely to know who those supply chain vendors are, let alone
receive rights to audit or risk assess them directly – leaving your organization
exposed to a potential backdoor supply chain cyberattack.



Learn More

OWN ENTERPRISE & SUBSIDIARY MONITORING

An organization’s internet surface area is often larger and more complex than it
may seem. Without a complete picture of their own risk surface, organizations
are severely disadvantaged in the event of a data breach, and face losing both
potential and existing business deals, vendors, or partners.



Learn More



OUR CUSTOMERS LOVE US.

We have an industry-leading 4.5 star average on Gartner Peer Insights.


Previous
4.0/5.0

- SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY

"RiskRecon has given us valuable insights to help manage our vendor portfolio.
We are now far more proactive with vendor management through the use of this
tool."

5.0/5.0

- INFORMATION SECURITY MANAGER IN THE BIOTECH INDUSTRY

"RiskRecon consistently delivers reliable ratings that are easy to digest while
also offering the tools to dig into the complexity as needed."

 
4.0/5.0

- PROCUREMENT MANAGER IN THE BANKING INDUSTRY

"I have found the overall experience to be great. Customer service is very
responsive and our support team is outstanding."

5.0/5.0

- DIRECTOR, INFOSEC ENTERPRISE AND THIRD-PARTY RISK MANAGEMENT IN THE
MANUFACTURING INDUSTRY

"What I love about the product is the customer service that comes along with it
for free. Our representatives have been fantastic to help with not only
installation but best practices in the industry. They have gone above and beyond
without further sales pitches. "

5.0/5.0

- INFO SECURITY PROGRAM MANAGER IN THE HEALTHCARE INDUSTRY

"The Riskrecon tool was very easy to implement and the customer success manager
was extremely helpful with getting the platform setup. While bringing up the
tool I recommended some enhancements which were implemented immediately. The
tool continues to be enhanced and now with the new compliance mapping it makes
it very straight forward to report risk to my leadership team." 

5.0/5.0

- VENDOR MANAGEMENT SUPERVISOR IN THE FINANCE INDUSTRY

“The product has a great deal of useful information, and understandable
dashboard and can be easily integrated into existing processes. The service has
been great any time we have need assistance the team has been very responsive.”

5.0/5.0

- THIRD-PARTY INFORMATION SECURITY LEAD IN THE ENERGY/UTILITIES INDUSTRY

"Delivery of roadmap always fantastic. User feedback clearly incorporated into
releases. Fast customer support and very few false positives."

4.0/5.0

- SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY

"RiskRecon has given us valuable insights to help manage our vendor portfolio.
We are now far more proactive with vendor management through the use of this
tool."

5.0/5.0

- INFORMATION SECURITY MANAGER IN THE BIOTECH INDUSTRY

"RiskRecon consistently delivers reliable ratings that are easy to digest while
also offering the tools to dig into the complexity as needed."

 
4.0/5.0

- PROCUREMENT MANAGER IN THE BANKING INDUSTRY

"I have found the overall experience to be great. Customer service is very
responsive and our support team is outstanding."

5.0/5.0

- DIRECTOR, INFOSEC ENTERPRISE AND THIRD-PARTY RISK MANAGEMENT IN THE
MANUFACTURING INDUSTRY

"What I love about the product is the customer service that comes along with it
for free. Our representatives have been fantastic to help with not only
installation but best practices in the industry. They have gone above and beyond
without further sales pitches. "

5.0/5.0

- INFO SECURITY PROGRAM MANAGER IN THE HEALTHCARE INDUSTRY

"The Riskrecon tool was very easy to implement and the customer success manager
was extremely helpful with getting the platform setup. While bringing up the
tool I recommended some enhancements which were implemented immediately. The
tool continues to be enhanced and now with the new compliance mapping it makes
it very straight forward to report risk to my leadership team." 

5.0/5.0

- VENDOR MANAGEMENT SUPERVISOR IN THE FINANCE INDUSTRY

“The product has a great deal of useful information, and understandable
dashboard and can be easily integrated into existing processes. The service has
been great any time we have need assistance the team has been very responsive.”

5.0/5.0

- THIRD-PARTY INFORMATION SECURITY LEAD IN THE ENERGY/UTILITIES INDUSTRY

"Delivery of roadmap always fantastic. User feedback clearly incorporated into
releases. Fast customer support and very few false positives."

4.0/5.0

- SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY

"RiskRecon has given us valuable insights to help manage our vendor portfolio.
We are now far more proactive with vendor management through the use of this
tool."

Next
 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7


CORE DIFFERENTIATORS

DATA ACCURACY

RiskRecon’s asset attribution is independently certified to 99.1% accuracy. And
we don’t hide any of the assessment details. It’s all visible to you and your
vendors at no additional fee. Action requires accuracy and transparency.
RiskRecon provides you both.

Download the Certification

CUSTOM-TUNED FOR YOUR NEEDS

Every RiskRecon assessment is custom-fitted to match your risk appetite,
enabling you to focus on the issues that matter to you. This is built on our
capability to automatically determine the value at risk for every system based
on the data types the system collects and the system functionality.

AUTOMATED WORKFLOWS

RiskRecon has advanced workflow capabilities that enable you to easily
understand risk. RiskRecon automatically produces vendor risk action plans that
contain only the issues you care about. Our collaboration workflow makes it easy
for you to share action plans with your vendors. RiskRecon even automatically
tracks and reports each vendor’s progress in addressing their action plan
issues.


EXPLORE OUR PRODUCT

Comprehensive Dashboard

Assessment Tuning

Board Level Reporting

Prioritized Issues

Portfolio Management

Compliance Indicators

Information Technology Data

Shareable Action Plans

How to Fix Critical Issues

Breach Events

Summary & Detailed Level Downloads

Advanced Filtering

Contact Sales


FAQS

Expand All | Collapse All

Can I review all vendors in the same fashion?

Different vendors may represent different levels of risk to the organization.
Higher risk relationships require more in-depth review while applying that same
level of assurance to low-risk vendors would largely be a waste of time. Have a
sound methodology in place that applies the appropriate amount of assurance to
the inherent risk of the relationship.

Why do I need to do more than send my annual security questionnaire?

As practitioners, if we rely solely on security questionnaires to assess our
vendors we are forced to try to determine if our vendor really has good security
controls, or if they are simply good at answering questionnaires. That is a tall
order. Relying on information from various tools, including questionnaires,
provides the most insight into the true operating effectiveness of controls.

How do I assess vendors in an RFP when I do not have enough staff to assess all
of the vendors I am already using?

One approach to help combat this challenge is to send each firm in the RFP a
short questionnaire based on must-have controls (no more than 15 or so
questions). Things like “Do you have a team dedicated to security?” Those will
highlight the critical controls. To further help differentiate vendors, using a
one-time report from a tool like RiskRecon can provide you with a quick
assessment of the external cyber hygiene of an organization. When a vendor is
ultimately selected, you can do the full assessment as part of the onboarding
process.

If I was going to take my TPRM program to the next level beyond questionnaires,
what should I look to add?

Once you have decided that a questionnaire alone is not doing what you need and
you want to bring more to your program, the first place many organizations look
is to add a continuous monitoring tool, such as RiskRecon. These tools address
many of the challenges and limitations of the security questionnaire.
Questionnaires are static and point in time, while a continuous monitoring tool
can keep an eye on your vendor when you are not doing the reviews. Continuous
monitoring tools are also useful to help validate the effectiveness of security
controls addressed in the questionnaire.

Products like RiskRecon are outside looking in, can they inform me about the
security of my vendor?

While it is true that RiskRecon is limited to seeing only externally visible
things, you can learn an awful lot about an organization by seeing the posture
they present to the world. In many ways, it is sort of like a house. You will be
hard-pressed to find many houses that look like a shack on the outside, but a
mansion on the inside. By looking at the externally facing posture, we can learn
about how that organization treats security. Do they take patching seriously?
Have they bothered to harden systems, or do they have unsafe network services
exposed to the internet? So, going back to the house analogy, we can make the
fair assumption that in most cases, organizations that look bad on the outside
and probably challenged on the inside as well. Large hosting organizations may
buck this trend, but for the most part, it holds.


LATEST INSIGHTS FROM CYBERSECURITY EXPERTS

Stay up to date on the leading edge of business form the world of cybersecurity.

April 24, 2024

REPORT: THE 2024 STATE OF RANSOMWARE

Through extensive research, RiskRecon has cataloged and analyzed over 1,454
destructive ransomware events to distill crucial patterns and insights. Our
study identifies periods of increased risk when breach frequencies spike
dramatically.




Read More

March 26, 2024

REPORT: THE STATE OF THIRD-PARTY RISK MANAGEMENT

Explore crucial findings in our latest white paper, drawing on insights from 112
risk management professionals. This pivotal study examines the complexities of
expanding supply chains, increased third-party breaches, and escalating
non-cyber risks.




Read More

April 27, 2021

FREE 3PTY RATINGS

Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50
vendors.


Read More

Locations:

Murray, UT
Boston, MA

E: sales@riskrecon.com


Contact Us

SOLUTIONS

 * RiskRecon
 * RiskRecon Assessments
 * Threat Protection
 * Systemic Risk Assessment
 * My Cyber Risk
 * Onboard Risk Check

USE CASES

 * Third-party diagnostic & prioritization
 * Cyber Attack Protection
 * Systemic Risk
 * SMB Threat Prevention
 * Merchant Risk Assessment

COMPANY

 * Why RR
 * Our Story Leadership
 * Partners
 * Careers
 * Privacy Policy
 * Terms of Use

RESOURCES

 * Academy
 * Blog
 * Events
 * Reports and WPs
 * Videos & Webinars
 * Ratings Model

Follow us:

© Copyright 2024. | Privacy Policy | Terms of Use
Manage cookies


HOW WE USE COOKIES

We use cookies to improve the site, measure performance, understand our
audience, enhance your experience and provide you with advertising based on your
browsing activities and interests on this and other sites. You can always change
your preferences or opt out at the bottom of the site. Please note some of the
cookies we use are essential for the parts of the site to operate. See “Manage
Cookies” for details.
Accept cookies
Manage cookies



COOKIES ON THIS SITE




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * ADVERTISING COOKIES

YOUR PRIVACY

Our site uses cookies and other similar technologies like pixel tags and web
beacons. A cookie is a small piece of data that a website asks your browser to
store on your computer or mobile device. Cookies allow a site to "remember" your
actions or preferences over time. So when you visit our site, the cookies may
store or retrieve information on your browser, which may be about you, your
preferences and/or your device. We use cookies, as well as third party cookies,
to operate and improve the site, measure our audience, enhance your experience
and provide you with content and advertising tailored to your interests based on
your browsing activities and actions on this and other sites. For instance,
cookies enable us to assess how many users access or use our service, which
content, products, and features of our service most interest our users, what
types of content our users like to see, and how our service performs from a
technical point of view.

Click on the different category headings to manage your cookie preferences and
find out more about the cookies we use and why. Click on Allow All if you want
all cookies enabled (although essential cookies are always enabled). Please keep
in mind that if you do not accept certain cookies, it may impact your experience
of the site and the services we are able to offer.

If you have questions about the way we use cookies, please contact us at
privacyanddataprotection@mastercard.com.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are strictly necessary for the site to work properly and cannot be
disabled in our systems. These cookies enable core functionality such as
security, network management, and accessibility. We do not always process
personal data when we place essential cookies. In the instances we do, we rely
on the following legal basis for processing: they are necessary to make the site
function for you to view. Please note that you can set your browser to block
these cookies, but this may affect how the site functions.

 * ONETRUST COOKIES
   
   Always Active
   
   

PERFORMANCE COOKIES

Performance cookies


These cookies help improve our site by collecting and reporting information on
how you use it. This information enables us to improve site performance, correct
any errors, and provide a quality user experience. For instance, it helps us
understand how long you spend on the site and from where you are accessing it,
and also helps us see if you have visited our sites before so we can identify
the number of unique users we receive.

 * ADOBE EXPERIENCE CLOUD
   
   Switch Label
   
   

ADVERTISING COOKIES

Advertising cookies


These cookies are used to analyze your interests and preferences to show you
relevant ads on this site and other sites based on your browsing habits and
activity. They may be placed through our site by third-party data or advertising
companies that we partner with, or other service providers. Social media cookies
and other tools enable you to connect or interact with social media sites and
offerings and may track your activities and interests.

If you choose to turn off these cookies, you may experience less relevant
advertising. Note that you may still see ads about Mastercard on the Internet
based on your visits and actions on other sites not related to Mastercard.

 * LINKEDIN
   
   Switch Label
   
   

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Save settings
Allow all