Data About Data, And How Companies Use It
Say goodbye to digital ambiguity and hello to informed decision-making. Reveal the unseen layers of the internet and understand data privacy practices across the web like you've never been able to understand them before.
Our Risk Analysis Turns Months Worth Of Work Into A One-Button Click
Search Public Information
Visit a vendor's website, pull all the policies and documentation available, look for security certs, try to find contact information for the privacy officer.
Perform Digital Forensics
Dig through network traffic, pull data breaches from expensive APIs, look through government websites and news reports for data breaches or other risky behavior
Contact Company
Realize there are limitations to what's possible with public information alone, pulling from APIs leads to technical hurdles, and sometimes you just need to verify with a human
Compile Documentation
Take everything you've learned, put it together into a spreadsheet to share with your team and document for later, realizing that this spreadsheet will automatically become unusable in the future
Approval Process
After reviewing all the documentation, comparing it against previous years and/or competitive products, make a subjective decision about risk based on your professional experience
Stop Repeating The Past
Do you want to continue doing this, repeatedly, for every vendor in your ecosystem or do you want to make your life easier?
Our Feature Set Is Nothing Short Of Comprehensive
Work with one of the most comprehensive data privacy risk intelligence systems on the web. End-to-end we provide everything you'll need, and more, to perform proper due diligence on all of your vendors.
Do You Know Who Has Access To Your Data?
According to Verizon's Data Breach Investigative Report, more than 62 percent of data breaches are caused by interactions with a third-party service provider, and experts believe that is conservative. How well do you know your vendors? Our vendor report provides you with insight into all of your vendors, their vendors, and beyond.
.png)
.png)
Stop Digging Through LinkedIn, We Got It
Can't figure out how to get in touch with the privacy office at a company? Tired of digging around sourcing websites? Search our directory instead of digging around the web trying to find information about how to get in touch with any one given vendor.
Track Down Where Your Data Is Today
Knowing where your data is stored reduces data privacy and data transfer risk across the globe. Whether processed or controlled, we have mapped out companies data centers, as well as the data centers of their vendors, making it easy for you to understand where your data is being stored.
.png)
.png)
Past Behavior Often Indicates Future Actions
We pull from, and aggregate, multiple data breach archives providing you with all the publicly available breaches we can find so you can make a better assessment about how much you can trust a company with your data.
What Legal Documents Are In Place?
Stop chasing down policies and reading each one individually to check for the differences. Our policy analysis system will help you keep up to date and understand what risks are involved in the way the policy is written, what might be missing, how long it will take to read and comprehend, and other critical info to assess risk.
.png)
.png)
Easily Make The Switch To Lower Risk Options
Defining risk within your existing vendors is enough work, forget about having to ever do procurement risk assessments again. Leverage our database connect common products with their alternatives and all the information you need to make informed decisions.