Platform Module

Vendor & Third-Party Risk

Centralized management of cybersecurity risk across your supply chain and third-party ecosystem. Automated assessments, continuous monitoring, and regulatory compliance — as required by NCA ECC-2 Domain 5 and SAMA CSF Domain 4.

Request a demo
Automated
Vendor assessments
Continuous
Risk monitoring
NCA + SAMA
Compliance mapped
SLA-tracked
Vendor obligations

Platform capabilities

Vendor registry

Centralized registry of all third-party vendors, suppliers, and service providers. Structured onboarding workflow with cybersecurity questionnaire and risk assessment.

Security assessments

Standardized vendor security assessment questionnaires aligned with NCA, SAMA, and industry standards. Automated scoring and risk classification.

Continuous monitoring

Ongoing monitoring of vendor security posture through external threat intelligence, breach databases, and certificate/DNS monitoring.

Risk scoring & classification

Automated risk scoring based on vendor criticality, data access level, assessment results, and external threat intelligence.

SLA & compliance tracking

Track vendor security SLA commitments, incident notification obligations, and regulatory compliance requirements.

Board reporting

Executive-ready third-party risk reports with trend analysis, risk heatmaps, and remediation tracking for NCA and SAMA audits.

Compliance mapping

Third-party risk controls mapped to Saudi and regional regulatory requirements

NCA ECC-2 (Domain 5)
SAMA CSF (Domain 4)
NCNICC
PDPL

Take control of your supply chain risk