Objectives

  • Industrialize the evaluation campaigns of subcontractors and suppliers through questionnaires and automate their processing
  • Identify the potential threats brought by a connected working relationship with a given subcontractor or supplier
  • Minimize the risk of cyber attacks and the impact on the proper operation of the supply chain
  • Compare potential subcontractors and suppliers to allow a choice towards cyber-trusted subcontractors and suppliers
  • Advise your subcontractors and suppliers to help them improve their security level
  • Ensure the global performance of your organization with compliant and secure relationships with trusted third parties

Targets

  • CISOs and their teams
  • Cyber managers for suppliers and subcontractors
  • Legal teams