Skip links

Supply chain analysis

Threat Based Cybersecurity — For the Ecosystem

An organization’s supply chain is only as strong as its weakest link. When it comes to cyber risk, weak links are getting difficult to uncover—especially if your company depends heavily on service providers and suppliers. Often, 3rd and 4th party providers will negatively contribute to your overall cyber risk. For the first time, Lighthouse’s Port Authority module enables national level organizations to continuously and proactively validate the security posture of their entire ecosystem. Port Authority allows commercial and government organizations to aggregate and analyze Lighthouse data across their area of interest (e.g. Defense Industrial Base, Supply Chain, Geographic Areas, etc.).

Threat Based Cybersecurity — Focused

5751BE57-2ECA-4A4B-A854-A494A8782302

Situational awareness

Benchmark security performance against the industry standard. Users can evaluate country and industry cybersecurity risk exposure; enabling departments and agencies agencies to self-assess their cybersecurity performance.
Find opportunities for improvement by continuously validating the actual security performance of critical infrastructure companies. New tactics can be tested and findings can be fixed and validated before a breach occurs. Users can be alerted when the cyber risk posture of these companies change with custom thresholds.

Find and understand performance gaps across the organization and around the world.

Port Authority aggregates and analyzes Lighthouse information from various parts of the organization.

85D85C1D-4078-4F1B-9751-0A08573CC949

Compare results across supply chain

Bringing organization reporting data together lets clients analyze their performance in a variety of ways: plot trends over time, identify hot spots, investigate new adversary tactics, highlight best practices, identify currency, and so much more.

Port Authority enables organizations to:

Group

Dramatically increase your situational awareness of cybersecurity performance throughout your ecosystem

Group

Identify hot-spots in need of immediate attention Track currency & completeness of tests

Group

Conduct dynamic analysis of new threat vectors or deep dive on specific threat vectors

Group

Assess industry & verticals performance metrics & trends

Group

Execute robust what-if scenarios

E773EAC8-5B32-4A89-A0FC-1F03E456B98F