Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • D&B Risk Analytics Reviews & Ratings
    67 Ratings
    Company Website
  • Predict360 Reviews & Ratings
    18 Ratings
    Company Website
  • Intelex Reviews & Ratings
    129 Ratings
    Company Website
  • Resolver Reviews & Ratings
    262 Ratings
    Company Website
  • Guardz Reviews & Ratings
    95 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    13 Ratings
    Company Website
  • eBuyerAssist Reviews & Ratings
    112 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    391 Ratings
    Company Website
  • Certainty Software Reviews & Ratings
    65 Ratings
    Company Website
  • Hyperproof Reviews & Ratings
    269 Ratings
    Company Website

What is Panorays?

Discover the fastest way to establish secure business relationships by automating the oversight of third-party security lifecycles. Gain an in-depth understanding of your vendors by merging insights from an attacker’s viewpoint with your organization's internal security protocols. The attacker’s perspective assesses the security stance as an assailant would, while the internal policy verification ensures compliance with established safety measures. This synergy results in an efficient and streamlined third-party security workflow solution. Panorays delivers rapid security ratings based on a simulated hacker's evaluation of external assets, complemented by an internal assessment to ensure that the supplier aligns with your organization's security requirements. Moreover, Panorays features automated, customized security questionnaires that include only relevant queries for each vendor, making it easy to track progress. You can choose from pre-existing templates or create a personalized set of questions tailored to your unique specifications. This integrated strategy not only bolsters security but also facilitates smoother collaboration with your suppliers, promoting a more secure business ecosystem. By adopting this approach, organizations can significantly reduce risks while enhancing their overall vendor management processes.

What is Cyber360?

Enhance your cybersecurity assessments and expand your practice to serve a broader range of clients by utilizing a premier cloud solution. Accurately identify, analyze, and resolve cybersecurity weaknesses while ensuring full transparency and oversight throughout the process. Employ a comprehensive, ready-to-implement, yet flexible framework of workflows and controls that fosters adaptability and enhances operational effectiveness. Create a structured cybersecurity evaluation strategy that aligns precisely with the unique needs of your organization. Gain a deeper insight into your organization's risk landscape across different business sectors, external collaborators, and geographical locations. Consolidate the gathering and storage of all evaluations, documentation, policies, and identified issues into a single repository for better organization. Proactively manage exceptions through the utilization of analytics, alerts, and collaborative efforts among team members. Embark on your journey with pre-built, industry-standard assessment templates, or opt to upload your tailored questionnaires for customization. Various assessment formats, including self-assessments and on-site reviews, are available to meet the diverse requirements of different businesses. This all-encompassing strategy not only empowers you to tackle cybersecurity challenges effectively but also facilitates the scaling of your operations, ensuring long-term success. Ultimately, taking such a comprehensive approach can significantly bolster your organization's resilience against evolving cyber threats.

Media

Media

Integrations Supported

Blend
Dropbox
HubSpot Customer Platform
Jira
Marketo
Microsoft Dynamics 365
Microsoft SharePoint
NetSuite
Oracle Cloud Infrastructure
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
Salesforce
SeeMetrics
ServiceNow
Twilio
X (Twitter)
Zendesk
anecdotes

Integrations Supported

Blend
Dropbox
HubSpot Customer Platform
Jira
Marketo
Microsoft Dynamics 365
Microsoft SharePoint
NetSuite
Oracle Cloud Infrastructure
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
Salesforce
SeeMetrics
ServiceNow
Twilio
X (Twitter)
Zendesk
anecdotes

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Panorays

Date Founded

2018

Company Location

Israel

Company Website

panorays.com

Company Facts

Organization Name

CENTRL

Date Founded

2015

Company Location

United States

Company Website

www.centrl.ai/products/cyber-security-risk-assessment-software/

Categories and Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Popular Alternatives

Popular Alternatives

CyberStrong Reviews & Ratings

CyberStrong

CyberSaint Security