The third-party risk management (TPRM) technology market offers solutions to identify, assess, manage, monitor and report on third-party risks associated with vendors, suppliers, distributors, agents, partners or other third parties. Solutions in this market can support a wide range of TPRM workflows across various risk domains. TPRM platforms in this market address the needs of a diverse range of customers and risk domains, including legal, compliance, procurement, supply chain, IT, cybersecurity and other teams that work with or provide routine oversight of third parties. Some technology solutions offer enterprise third-party risk management workflow as a feature, along with risk tiering, due diligence, risk mapping, metrics and reporting mechanisms. Other platforms may facilitate integration with risk data subscriptions, data aggregators or other subscriptions. The TPRM technology market is a complex array of solutions servicing many business functions across an enterprise. TPRM solution providers can be categorized into technology platforms and tools, or risk-domain-specific data and insights.
VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools