Vulnerability Scanning

 

Vulnerability scanning is the systematic identification, analysis and reporting of technical security vulnerabilities that unauthorized parties and individuals may use to exploit and threaten the confidentiality, integrity and availability of business and technical data and information. External vulnerability scanning specifically examines an organization’s security profile from the perspective of an outsider or someone who does not have access to systems and networks behind the organization’s external security perimeter. Your external IPs be scanned once a year, once a quarter or monthly.

Read More

Mobile Application Scanning

 

Mobile platforms by default make certain promises about their environment. Development teams should not rely on these promises to protect critical data and code. Architecture review and threat modeling process will includes assessing and documenting security risks in the context of use cases, services, roles and functions unique to your application. The threat modeling is performed in collaboration with your business, engineering, operations and corporate security teams to understand and create the system’s security objectives, threat profile, attacks, vulnerabilities and countermeasures from design to deployment.

Read More

Darkweb Credential Monitoring

 

We provide the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password. We continuously monitor the dark web for stolen databases and identities, and maintains the encrypted data in our proprietary database. When integrated with an IAM solution, we can provide superior visibility into user-centric risk and the ability to automate appropriate corrective actions, preventing the abuse of compromised credentials.

Read More

ENTERPRISE

The Razient ENTERPRISE application allows subscribers to login from anywhere in the world to manage their individual suppliers or locations for potential supply chain disruptions and IT and other compliance issues. There are two primary inputs into the Razient supplier databases:
  • Supplier Compliance Information – Suppliers provide information about their individual compliance measures and the application reports on how suppliers are achieving various compliance metrics.
  • Daily Threats by Location – RAZIENT analysts provide daily threat and incident data correlated to individual suppliers’ locations.
Razient ENTERPRISE Includes:
  • Dashboard views of threats and risks to the supply chain globally by supplier.
  • A series of surveys and risk indicators to evaluate and assess compliance.
  • Crisis management functions that provide the ability to be proactive in mitigating risks and threats.
  • Key reports at client management’s fingertips in order to act and mitigate risks in a timely manner.
  • Underlying integrated secure database contains all client information.
  • Daily updated tracking of incident types such as Shooting, Bombing, Fires Floods, Power outages, Riots, Disease outbreaks, Earthquakes, Hurricanes, Tornados, Bridge collapses, Plane disruptions, and more provides a wide variety of global threats.

KEY FEATURES

Global Incident Management
  • Global Threat Dashboard
  • Data feeds from numerous data sources
  • Immediate correlation to locations
  • Determine which locations/parts are facing potential threats
  • Crisis Management tracking, and mitigation steps
Compliance Management
  • Achieve Regulatory Compliance and Industry Best Practices
  • Customize, Distribute, Manage, and Monitor Risk Surveys
  • Reduce Cost of Vendor Risk Management through automated processes
  • Track and Report on Compliance Results
  • Utilize a library of predefined assessments
  • Archive Compliance Results
  • Centralized Document Collection
audit and compliance
Technology Overview
Razient Enterprise is delivered as a managed service. Our hosted application reduces total cost of ownership and allows for rapid deployment and utilization.
  • No software deployment required
  • Robust database driven application
  • Daily updated database of events published hourly
  • Continuously expanding incident search criteria
  • OEM and co-branded option available
  • Webservice available for importing data into third party application
  • Mobile application custom development available
  • Scalable hosted application with centralized management
  • Multi-user, role based access restrictions, secure communications
  • Multiple language support
  • Data import and export capabilities