Black Kite is a company focused on solving the issue of cyber attacks, particularly those that occur through third parties. The company has developed the first global third-party cyber risk monitoring platform. Its perspective is unique in that it is built from a perspective to counter hacker's approaches. Black Kite concentrates on enhancing the overall cyber ecosystem with their highly accurate and comprehensive cyber intelligence. Unlike other security ratings service providers, Black Kite provides standards-based cyber risk assessments analyzing the cybersecurity posture from three essential dimensions: technical, financial, and compliance, thus bringing a broader and more holistic approach to addressing potential cyber threats and vulnerabilities.
Do You Manage Peer Insights at Black Kite?
Access Vendor Portal to update and manage your profile.
1. Straightforward results that are understandable to non-technical employees. 2. Very quick turnaround. By using public resources we are able to complete scans in minutes. 3. Quick responses to found vulnerabilities. It's remarkably easy to report and remove false positives from our own scans or scans for our vendors.
Blackkite UI is better than other competitors we tested and it provides infrastructure vulnerability checks as well as application security checks which is what we are looking for overall security of the organization.
The quick responses that I receive. The rep is clearly has ability to recognize urgent issues and handles them until resolved.
1. High tendency for false positives. The scans tend to focus on outdated systems that may be left behind on company servers (EOL software that hasn't been fully removed, legacy code, etc). 2. Sorting difficulty. I sometimes struggle to group vendors by who manages them, what department they interact with, etc. We can create custom tags, but being able to set up groups or separate tabs would be preferred. 3. Lack of vulnerability information. While most vulnerabilities listed are easy enough to understand, it would be nice if some level of remediation instruction could be provided.
Often times the vulnerabilities posted are incorrect or outdated. Moreover, it lacks a detailed explanation for vulnerability resolution.
Sometimes I have to sign back in - not timing out just asks me to sign in again.