下载PDF
CyberGRX
概述
公司介绍
CyberGRX 提供最全面的第三方网络风险管理平台,以经济高效地识别、评估、减轻和监控企业在整个合作伙伴生态系统中的风险敞口。通过自动化和高级分析,CyberGRX 解决方案使企业能够以协作方式缓解因对供应商、合作伙伴和客户的日益相互依赖而带来的威胁。 CyberGRX 位于科罗拉多州丹佛市。有关更多信息,请访问 www.cybergrx.com 或在 Twitter 上关注 @CyberGRX。
主要客户
Solix、黑石、ComplySci
物联网应用简介
技术栈
CyberGRX的技术栈描绘了CyberGRX在网络安全和隐私等物联网技术方面的实践。
-
设备层
-
边缘层
-
云层
-
应用层
-
配套技术
技术能力:
无
弱
中等
强
实例探究.
Case Study
Scaling Third-Party Cyber Risk Management Post-Merger with CyberGRX
A technology company faced a significant challenge after merging with another organization, which resulted in the doubling of their third-party ecosystem. Prior to the merger, the company had an efficient third-party program that included an in-house assessment working in tandem with a GRC tool. However, the merger put a strain on this system as the number of third parties in their ecosystem doubled. The company's team was unable to scale their current program to effectively manage their new vendors due to a lack of increase in human resources. The company was in need of a solution that could seamlessly integrate with and scale their process, enabling them to apply the right level of due diligence across their new and expanded ecosystem efficiently.
Case Study
A Force Multiplier for Third-Party Cyber Risk Management: Blackstone's Case Study
Blackstone, a leading investment firm, faced a significant challenge in managing its third-party cyber risk. With a rapidly growing business, a robust vendor ecosystem, and a portfolio of over 100 companies, Blackstone needed a solution that could efficiently and effectively manage its third-party cyber risk. The existing risk management program, initiated in 2012, was based on spreadsheets and phone calls, which was not scalable to keep up with the 4 to 6 new vendors coming on board every month. This challenge was not unique to Blackstone, as their entire portfolio of companies shared the same issue. The companies were using different methodologies to support their risk programs, there was a lot of overlap among common vendors being assessed by multiple companies, and findings from assessments were rarely shared.
同类供应商.
Supplier
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
Supplier
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)
Supplier
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.