www.riskrecon.com
Open in
urlscan Pro
2606:2c40::c73c:67e4
Public Scan
Submitted URL: http://www.riskrecon.com/
Effective URL: https://www.riskrecon.com/
Submission: On February 19 via manual from IE — Scanned from DE
Effective URL: https://www.riskrecon.com/
Submission: On February 19 via manual from IE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Blog * Academy * Login * Solutions * Third-Party Risk Management * Supply Chain Risk Management * Enterprise Risk Management * Industries * Finance * Insurance * Healthcare * Energy * Defense * Use Cases * Third-party Portfolio Diagnostic & Prioritization * Supply Chain Monitoring & Visualization * Own Enterprise & Subsidiary Monitoring * Situational Awareness * Vendor Onboarding * Request for Proposal (RFP) * Mergers & Acquisitions * Vendor Due Diligence * Advanced Assessment Planning PONEMON STUDY: 2022 DATA RISK IN THE THIRD-PARTY ECOSYSTEM We surveyed over 1,000 IT security professionals to understand how well companies are detecting, mitigating, and minimizing risks associated with third parties and Nth parties. Read More * Why RiskRecon * The RiskRecon Difference * Deep Assessment * Risk Prioritized * Efficient * Accurate WHITE PAPER: INSIGHTS FROM 10 YEARS OF DATA BREACH MONITORING This paper provides a deep examination of data breach events and gives readers risk management insights that be learned from the events and applied to every TPRM program. Read More * Company * Team * News & Events * News Releases * Media Coverage * Events * Our Story * Careers * Contact Us FREE 3PTY RATINGS Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors. Read More * Partners * Alliance Partners * Channel Partners * Resources * RiskRecon Insights * RiskRecon Academy * Ransomware TPRM Resources * RiskRecon Ratings Model * Blog * Reports & White Papers * Videos & Webinars NEW BLOG: SUPPLIER RISK MANAGEMENT: HOW IMPORTANT IS IT? How important is Supplier Risk Management? Read our new blog to learn why you need to make this a priority Read More Request a Demo Free 3PTY Ratings * Solutions Main Menu Solutions * Third-Party Risk Management * Supply Chain Risk Management * Enterprise Risk Management * Industries Solutions Industries * Finance * Insurance * Healthcare * Energy * Defense * Use Cases Solutions Use Cases * Third-party Portfolio Diagnostic & Prioritization * Supply Chain Monitoring & Visualization * Own Enterprise & Subsidiary Monitoring * Situational Awareness * Vendor Onboarding * Request for Proposal (RFP) * Mergers & Acquisitions * Vendor Due Diligence * Advanced Assessment Planning PONEMON STUDY: 2022 DATA RISK IN THE THIRD-PARTY ECOSYSTEM We surveyed over 1,000 IT security professionals to understand how well companies are detecting, mitigating, and minimizing risks associated with third parties and Nth parties. Read More * Why RiskRecon Main Menu Why RiskRecon * The RiskRecon Difference Why RiskRecon The RiskRecon Difference * Deep Assessment * Risk Prioritized * Efficient * Accurate WHITE PAPER: INSIGHTS FROM 10 YEARS OF DATA BREACH MONITORING This paper provides a deep examination of data breach events and gives readers risk management insights that be learned from the events and applied to every TPRM program. Read More * Company Main Menu Company * Team * News & Events Company News & Events * News Releases * Media Coverage * Events * Our Story * Careers * Contact Us FREE 3PTY RATINGS Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors. Read More * Partners Main Menu Partners * Alliance Partners * Channel Partners * Resources Main Menu Resources * RiskRecon Insights Resources RiskRecon Insights * RiskRecon Academy * Ransomware TPRM Resources * RiskRecon Ratings Model * Blog * Reports & White Papers * Videos & Webinars NEW BLOG: SUPPLIER RISK MANAGEMENT: HOW IMPORTANT IS IT? How important is Supplier Risk Management? Read our new blog to learn why you need to make this a priority Read More PHONE 801.758.0560 EMAIL sales(@)riskrecon(.)com Contact Us PONEMON STUDY: 2022 DATA RISK IN THE THIRD-PARTY ECOSYSTEM We surveyed over 1,000 IT security professionals to understand how well companies are detecting, mitigating, and minimizing risks associated with third parties and Nth parties. Read More WHITE PAPER: INSIGHTS FROM 10 YEARS OF DATA BREACH MONITORING This paper provides a deep examination of data breach events and gives readers risk management insights that be learned from the events and applied to every TPRM program. Read More FREE 3PTY RATINGS Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors. Read More NEW BLOG: SUPPLIER RISK MANAGEMENT: HOW IMPORTANT IS IT? How important is Supplier Risk Management? Read our new blog to learn why you need to make this a priority Read More CYBERSECURITY RATINGS AND INSIGHTS THAT MAKE IT EASY TO UNDERSTAND AND ACT ON YOUR RISKS. Automated risk assessments tuned to match your risk appetite. Free Ratings for up to 50 Vendors Free Ratings for up to 50 Vendors How it works WHITE PAPER: INSIGHTS FROM 10 YEARS OF DATA BREACH MONITORING This paper provides a deep examination of data breach events and gives readers risk management insights that be learned from the events and applied to every TPRM program. Download the report here LEADING RISKRECON USE CASES THIRD-PARTY RISK MANAGEMENT Organizations now largely entrust third parties with their most sensitive data and operational functions. To help safeguard your digital ecosystem from third-party risk, you need simple, real-time visibility of third-party partners’ cyber performance. Companies lacking this visibility cannot detect potential threats and address them. Learn More SUPPLY CHAIN RISK Catastrophic multi-party breach events show that cyber risk can originate in supply chain layers beyond your immediate third parties. However, cybersecurity analysts are less likely to know who those supply chain vendors are, let alone receive rights to audit or risk assess them directly – leaving your organization exposed to a potential backdoor supply chain cyberattack. Learn More OWN ENTERPRISE & SUBSIDIARY MONITORING An organization’s internet surface area is often larger and more complex than it may seem. Without a complete picture of their own risk surface, organizations are severely disadvantaged in the event of a data breach, and face losing both potential and existing business deals, vendors, or partners. Learn More LEADING ORGANIZATIONS AROUND THE WORLD USE RISKRECON TO MINIMIZE THEIR RISK OUR CUSTOMERS LOVE US. We have an industry-leading 4.6 star average on Gartner Peer Insights. Previous 4.0/5.0 - SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY "RiskRecon has given us valuable insights to help manage our vendor portfolio. We are now far more proactive with vendor management through the use of this tool." 5.0/5.0 - DIRECTOR, INFOSEC ENTERPRISE AND THIRD-PARTY RISK MANAGEMENT IN THE MANUFACTURING INDUSTRY "What I love about the product is the customer service that comes along with it for free. Our representatives have been fantastic to help with not only installation but best practices in the industry. They have gone above and beyond without further sales pitches. " 5.0/5.0 - INFO SECURITY PROGRAM MANAGER IN THE HEALTHCARE INDUSTRY "The Riskrecon tool was very easy to implement and the customer success manager was extremely helpful with getting the platform setup. While bringing up the tool I recommended some enhancements which were implemented immediately. The tool continues to be enhanced and now with the new compliance mapping it makes it very straight forward to report risk to my leadership team." 4.0/5.0 - CYBER CRIMES ADVISOR IN THE FINANCE INDUSTRY "Much better than competition. Excellent customer support - outstanding team." 4.0/5.0 - INFORMATION SECURITY MANAGER IN THE HEALTHCARE INDUSTRY "RiskRecon is a valuable tool in the vendor risk management space, providing actionable data and analytics that have helped to manage and secure our supply chain. Their customer support staff is knowledgeable and quick to respond and their continued investment into the solution is encouraging. " 5.0/5.0 - VENDOR MANAGEMENT SUPERVISOR IN THE FINANCE INDUSTRY “The product has a great deal of useful information, and understandable dashboard and can be easily integrated into existing processes. The service has been great any time we have need assistance the team has been very responsive.” 5.0/5.0 - THIRD-PARTY INFORMATION SECURITY LEAD IN THE ENERGY/UTILITIES INDUSTRY "Delivery of roadmap always fantastic. User feedback clearly incorporated into releases. Fast customer support and very few false positives." 4.0/5.0 - SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY "RiskRecon has given us valuable insights to help manage our vendor portfolio. We are now far more proactive with vendor management through the use of this tool." 5.0/5.0 - DIRECTOR, INFOSEC ENTERPRISE AND THIRD-PARTY RISK MANAGEMENT IN THE MANUFACTURING INDUSTRY "What I love about the product is the customer service that comes along with it for free. Our representatives have been fantastic to help with not only installation but best practices in the industry. They have gone above and beyond without further sales pitches. " 5.0/5.0 - INFO SECURITY PROGRAM MANAGER IN THE HEALTHCARE INDUSTRY "The Riskrecon tool was very easy to implement and the customer success manager was extremely helpful with getting the platform setup. While bringing up the tool I recommended some enhancements which were implemented immediately. The tool continues to be enhanced and now with the new compliance mapping it makes it very straight forward to report risk to my leadership team." 4.0/5.0 - CYBER CRIMES ADVISOR IN THE FINANCE INDUSTRY "Much better than competition. Excellent customer support - outstanding team." 4.0/5.0 - INFORMATION SECURITY MANAGER IN THE HEALTHCARE INDUSTRY "RiskRecon is a valuable tool in the vendor risk management space, providing actionable data and analytics that have helped to manage and secure our supply chain. Their customer support staff is knowledgeable and quick to respond and their continued investment into the solution is encouraging. " 5.0/5.0 - VENDOR MANAGEMENT SUPERVISOR IN THE FINANCE INDUSTRY “The product has a great deal of useful information, and understandable dashboard and can be easily integrated into existing processes. The service has been great any time we have need assistance the team has been very responsive.” 5.0/5.0 - THIRD-PARTY INFORMATION SECURITY LEAD IN THE ENERGY/UTILITIES INDUSTRY "Delivery of roadmap always fantastic. User feedback clearly incorporated into releases. Fast customer support and very few false positives." 4.0/5.0 - SECURITY SPECIALIST IN THE MANUFACTURING INDUSTRY "RiskRecon has given us valuable insights to help manage our vendor portfolio. We are now far more proactive with vendor management through the use of this tool." Next * 1 * 2 * 3 * 4 * 5 * 6 * 7 CORE DIFFERENTIATORS DATA ACCURACY RiskRecon’s asset attribution is independently certified to 99.1% accuracy. And we don’t hide any of the assessment details. It’s all visible to you and your vendors at no additional fee. Action requires accuracy and transparency. RiskRecon provides you both. Download the Certification CUSTOM-TUNED FOR YOUR NEEDS Every RiskRecon assessment is custom-fitted to match your risk appetite, enabling you to focus on the issues that matter to you. This is built on our capability to automatically determine the value at risk for every system based on the data types the system collects and the system functionality. AUTOMATED WORKFLOWS RiskRecon has advanced workflow capabilities that enable you to easily understand risk. RiskRecon automatically produces vendor risk action plans that contain only the issues you care about. Our collaboration workflow makes it easy for you to share action plans with your vendors. RiskRecon even automatically tracks and reports each vendor’s progress in addressing their action plan issues. EXPLORE OUR PRODUCT Comprehensive Dashboard Assessment Tuning Board Level Reporting Prioritized Issues Portfolio Management Compliance Indicators Information Technology Data Shareable Action Plans How to Fix Critical Issues Breach Events Summary & Detailed Level Downloads Advanced Filtering Contact Sales FAQS Expand All | Collapse All Can I review all vendors in the same fashion? Different vendors may represent different levels of risk to the organization. Higher risk relationships require more in-depth review while applying that same level of assurance to low-risk vendors would largely be a waste of time. Have a sound methodology in place that applies the appropriate amount of assurance to the inherent risk of the relationship. Why do I need to do more than send my annual security questionnaire? As practitioners, if we rely solely on security questionnaires to assess our vendors we are forced to try to determine if our vendor really has good security controls, or if they are simply good at answering questionnaires. That is a tall order. Relying on information from various tools, including questionnaires, provides the most insight into the true operating effectiveness of controls. How do I assess vendors in an RFP when I do not have enough staff to assess all of the vendors I am already using? One approach to help combat this challenge is to send each firm in the RFP a short questionnaire based on must-have controls (no more than 15 or so questions). Things like “Do you have a team dedicated to security?” Those will highlight the critical controls. To further help differentiate vendors, using a one-time report from a tool like RiskRecon can provide you with a quick assessment of the external cyber hygiene of an organization. When a vendor is ultimately selected, you can do the full assessment as part of the onboarding process. If I was going to take my TPRM program to the next level beyond questionnaires, what should I look to add? Once you have decided that a questionnaire alone is not doing what you need and you want to bring more to your program, the first place many organizations look is to add a continuous monitoring tool, such as RiskRecon. These tools address many of the challenges and limitations of the security questionnaire. Questionnaires are static and point in time, while a continuous monitoring tool can keep an eye on your vendor when you are not doing the reviews. Continuous monitoring tools are also useful to help validate the effectiveness of security controls addressed in the questionnaire. Products like RiskRecon are outside looking in, can they inform me about the security of my vendor? While it is true that RiskRecon is limited to seeing only externally visible things, you can learn an awful lot about an organization by seeing the posture they present to the world. In many ways, it is sort of like a house. You will be hard-pressed to find many houses that look like a shack on the outside, but a mansion on the inside. By looking at the externally facing posture, we can learn about how that organization treats security. Do they take patching seriously? Have they bothered to harden systems, or do they have unsafe network services exposed to the internet? So, going back to the house analogy, we can make the fair assumption that in most cases, organizations that look bad on the outside and probably challenged on the inside as well. Large hosting organizations may buck this trend, but for the most part, it holds. LATEST INSIGHTS FROM CYBERSECURITY EXPERTS Stay up to date on the leading edge of business form the world of cybersecurity. February 7, 2023 WHITE PAPER: INSIGHTS FROM 10 YEARS OF DATA BREACH MONITORING This paper provides a deep examination of data breach events and gives readers risk management insights that be learned from the events and applied to every TPRM program. Read More April 27, 2021 FREE 3PTY RATINGS Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors. Read More February 2, 2023 NEW BLOG: SUPPLIER RISK MANAGEMENT: HOW IMPORTANT IS IT? How important is Supplier Risk Management? Read our new blog to learn why you need to make this a priority! Read More Locations: Salt Lake City, UT Boston, MA E: sales@riskrecon.com Contact Us SOLUTIONS * Finance * Insurance * Healthcare * Energy * Defense WHY RISKRECON * Deep Assessment * Risk Prioritized * Efficient * Accurate COMPANY * Our Story * Partners * Leadership * Careers * Privacy Policy * Terms of Use RESOURCES * Blog * Videos & Webinars * White Papers * News Releases * Media Coverage * Events Follow us: © Copyright 2023. | Privacy Policy | Terms of Use × We Value Your Privacy Settings NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar technologies on this site and use personal data (e.g., your IP address). If you consent, the cookies, device identifiers, or other information can be stored or accessed on your device for the purposes described below. You can click "Allow All" or "Decline All" or click Settings above to customize your consent. NextRoll and our advertising partners process personal data to: ● Store and/or access information on a device; ● Create a personalized content profile; ● Select personalised content; ● Personalized ads, ad measurement and audience insights; ● Product development. For some of the purposes above, our advertising partners: ● Use precise geolocation data. Some of our partners rely on their legitimate business interests to process personal data. View our advertising partners if you wish to provide or deny consent for specific partners, review the purposes each partner believes they have a legitimate interest for, and object to such processing. If you select Decline All, you will still be able to view content on this site and you will still receive advertising, but the advertising will not be tailored for you. You may change your setting whenever you see the Manage consent preferences on this site. Decline All Allow All Manage consent preferences