Suppliers
United States
CyberGRX
Overview
This profile is not managed yet, if you would like to manage
this profile, please contact us at team@iotone.com
this profile, please contact us at team@iotone.com
CyberGRX |
|
United States | |
Denver | |
2015 | |
Private | |
< $10m | |
51 - 200 | |
Open website |
IoT Snapshot
Technology Stack
Case Studies
Number of Case Studies2
Scaling Third-Party Cyber Risk Management Post-Merger with CyberGRX
A technology company faced a significant challenge after merging with another organization, which resulted in the doubling of their third-party ecosystem. Prior to the merger, the company had an efficient third-party program that included an in-house assessment working in tandem with a GRC tool. However, the merger put a strain on this system as the number of third parties in their ecosystem doubled. The company's team was unable to scale their current program to effectively manage their new vendors due to a lack of increase in human resources. The company was in need of a solution that could seamlessly integrate with and scale their process, enabling them to apply the right level of due diligence across their new and expanded ecosystem efficiently. |
|
A Force Multiplier for Third-Party Cyber Risk Management: Blackstone's Case Study
Blackstone, a leading investment firm, faced a significant challenge in managing its third-party cyber risk. With a rapidly growing business, a robust vendor ecosystem, and a portfolio of over 100 companies, Blackstone needed a solution that could efficiently and effectively manage its third-party cyber risk. The existing risk management program, initiated in 2012, was based on spreadsheets and phone calls, which was not scalable to keep up with the 4 to 6 new vendors coming on board every month. This challenge was not unique to Blackstone, as their entire portfolio of companies shared the same issue. The companies were using different methodologies to support their risk programs, there was a lot of overlap among common vendors being assessed by multiple companies, and findings from assessments were rarely shared. |
Similar Suppliers
Number of Similar Suppliers5
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012 |
|
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT) |
|
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. |
|
Topsec
Topsec Cloud Solutions is a major provider of managed email and web security solutions in the cloud. For almost two decades we have served a diverse range of customers in Government, Healthcare, Engineering, Information Technology and other industries. Anti-spam, Anti-virus, Email security, Email content filtering, Sandboxing, Email archiving, File sharing, and Domain management are among our services. In summary, we match our clients’ security demands and assist them in securing and managing their corporate information with no upfront costs. |
|
Sentinel IPS
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |