Sally for your Supply Chain

 

Check your suppliers security before
bringing a new risk to your company.

we can help you

Vulnerabilities Scan

 

Are you tired of non-effective
questionnaires?
We can check your suppliers security.

 

Supplier Basic Cyber Risk Report

Supplier Advanced Cyber Risk Report

 

Optional for Advanced Reports
Supplier Brand Protection Check
(We check, not only the perimeter
but also the digital footprint)

digital risk assessment 2

Functionalities

Basic Report
Supplier

 

Cyber Risk Check
Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

1850€

(per domain)

Advanced Report
Supplier Cyber

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Brand Protection (optional)

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
    Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Price on request
Basic Report
Supplier

 

Cyber Risk Check
Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

1850€

(per domain)

Advanced Report
Supplier Cyber

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Brand Protection (optional)

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
    Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Price on request

Do you have a lot of suppliers?
Let’s talk to find your best cost-efficient package

Vulnerabilities Monitoring

 

Would you like to monitor your Supply
chain Risks 24/7? Then, we have the tools
you need.

 

Included
Supplier Cyber Risk Surveillance
Active Supplier Mitigation
Real time alarms

 

Optional
Supplier’s Brand Protection Surveillance

 

Frequency
Quarterly or Monthly reports (on request)

Description
Yearly service
Analyst included if required

camara

Functionalities

Basic Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score
Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Optional Functions

Quarterly or Monthly Reports

 

Price on request
Advanced Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential
– Social Media Intelligence

Brand Protection
(optional)

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Quarterly or Monthly Reports

 

Price on request
Basic Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score
Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Optional Functions

Quarterly or Monthly Reports

 

Price on request
Advanced Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential
– Social Media Intelligence

Brand Protection
(optional)

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Quarterly or Monthly Reports

 

Price on request

How Sally Works

Suppliers
Scanning
IT Department
Ally
Risk Impact
Mitigation

We use Intelligence at
different levels to
calculate the Cyber Risk
Exposure that a supplier
might bring to your
business.

 

We find out and monitor
digital vulnerabilities and
risks outside the
suppliers’ security
perimeter.

We allow your IT- Security
employees work with
what they are good at
instead of dealing with
boring questionaries.

We cover the extended
attack surface; meaning
the security perimeters
of your suppliers and
partners to reduce the
risk impact in your
business.

Suppliers
Scanning

We use Intelligence at
different levels to
calculate the Cyber Risk
Exposure that a supplier
might bring to your
business.

 

We find out and monitor
digital vulnerabilities and
risks outside the
suppliers’ security
perimeter.

IT Department
Ally

We allow your IT- Security
employees work with
what they are good at
instead of dealing with
boring questionaries.

Risk Impact
Mitigation

We cover the extended
attack surface; meaning
the security perimeters
of your suppliers and
partners to reduce the
risk impact in your
business.

Key Diferentiators

It is based on real facts gathered using Intelligence.

It shows a continuously scanning instead of a static view (questionnaries).

It is automatized.

thinklike a hacker