Third-Party Cyber Risk Security Features
Bank-grade Third-Party Cyber Risk management, for any organisation.

Manage | Monitor | Escalate |
Attack Surface Discovery
| Reporting & Benchmarking
| Third Parties
|
Security Ratings
| Enquiries & Improvements
| IT Security Questionnaires
|
Attack Surface Reduction
| Integration
| Vendor Due Diligence & Selection
|
Oversight
|
Manage your third parties
Gain visibility over your third parties with accurate, automated attack surface discovery, actionable security ratings and like-for-like peer comparison.

Features
Bank-grade attack surface management, for any organisation.
Attack surface discovery | ||
Automated discovery of digital assets | Orbit Cyber Risk’s powerful Machine-Learning algorithm accurately & automatically discovers your public-facing IT infrastructure. |
|
Eliminate false positives | Attack surface discovery module is designed to eliminate false positives, accurately identifying the digital assets an organisation manages & is exposed to. |
|
Monitor for changes | Instantly identify when domains are added or removed from your network. |
|
Security Ratings | ||
Organisation security ratings | Orbit Cyber Risk ratings provide continuous, objective analysis of your network. Our security ratings are based on Thomas Murray’s proprietary methodology, as well as analysis of open-sources and high-quality third-party data feeds. |
|
Domain security ratings | Visualise risk at a domain and sub-domain level, with individual ratings for every digital asset in your footprint. Explore the underlying issues, toggle according to the highest risk to focus remediation. |
|
Benchmarking | Orbit Cyber Risk benchmarks your organisation against its peers, giving absolute security ratings a real-world perspective. |
|
Risks | ||
Breaches | Discover breaches in your network to prevent attacks which could lead to data loss, operational disruption, financial loss or reputational damage. |
|
Vulnerabilities | Discover vulnerabilities running on your domains that could be exploited by malicious actors. |
|
Misconfigurations | Continuous information about misconfigurations observed in your network, allowing you to remediate potential operational and security issues. |
|
Monitor
Get alerts directly into your inbox, create tailored benchmarks, and report with confidence to management in a language they understand. Manage accounts with confidence and raise enquiries directly with our expert analysts.

Reporting & Benchmarking | ||
Executive Reporting | Access tailored management reporting suite for boards, regulators, risk & compliance and IT Security. |
|
Email Notifications | Get real-time alerts and reporting on your portfolio directly into your inbox, with custom tiggers and recipients. |
|
Custom Competitor Analysis | Create custom benchmarks of direct peers and competitors. |
|
Enquiries and Improvements | ||
Live enquiries tool | Complement the tool’s continuous security analysis and intuitive dashboards by raising enquiries with our expert team. |
|
Access to expert analysts | Access our team to escalate with third parties, request remediation advice, risk quantification or any other queries. |
|
Track organisation and domain scores | See how your portfolio’s score changes over time, as well as every underlying domain. |
|
Integration | ||
APIs & Data Feeds | Access information via APIs or integrate external data feeds into your Thomas Murray account. |
|
Oversight & Operations | ||
Accounts & Permissions | Share access with InfoSec and management colleagues across departments and offices and provide access to high-risk third parties. |
|
Historical Performance | See your organisation’s security performance at any point in history. |
|
Account Security | Ensure account & data security with permissions, sensitive data redaction and robust platform security. |
|
Escalate with third parties according to your risk framework
Provide third parties free and full access to the Cyber Risk dashboard to remediate key issues; issue questionnaires to any third-party to find out more about their internal security- controls, procedures, frequency of testing, details of recent breaches and much more.

Third Parties | ||
Provide free access for remediation | Provide third parties with full, free access to their assessment for 30 days. |
|
Monitor changes | See your clients’, suppliers’ and other counterparties’ scores improve every week, demonstrably reducing supply chain risk. |
|
IT Security Questionnaires | ||
Issue & analyse | Escalate with high-risk third parties (or your whole portfolio) with in-depth IT security questionnaires. |
|
Manage & Monitor | Manage projects, track completion rates and communicate with team members and respondents. |
|
Assess & Remediate | Access third parties and benchmark against peers; identify risks & escalate them with third parties. |
|
Vendor due diligence & selection | ||
Standard and custom questionnaires | Access industry-standard IT security questionnaires, recycle questions and streamline your framework. |
|
Track, Report & Benchmark | Track and report the assessment process, create dynamic benchmarks and investigate findings with interactive analytics. |
|
For more information about Cyber Risk, contact our experts:
