CIO Influence
CIO Influence News Security

KELA Improves Cybersecurity Posture with its New Third-Party Risk Management module

KELA Improves Cybersecurity Posture with its New Third-Party Risk Management module

KELA, a global leader in cyber threat intelligence solutions, has announced the launch of its innovative Third-Party Risk Management (TPRM) module, which is fully integrated into its threat intelligence platform. This new offering is specifically designed to strengthen organizational defenses by focusing on software supply chain risks. KELA’s TPRM module stands out in the market due to its advanced algorithm, which not only assesses traditional attack surface risk factors but also integrates comprehensive threat intelligence from KELA’s platform, including leaked credentials, network access and other critical threat indicators, providing a more robust and predictive risk score.

Also Read: Significance of 5G on Enterprise Mobility and Network Management

The TPRM module employs an advanced scoring algorithm that synthesizes data from KELA’s comprehensive cyber threat intelligence and attack surface monitoring solutions. This method utilizes current and impending, factual threat data, enabling dynamic risk scoring that adjusts as new information surfaces. As a result, organizations receive risk assessments that are not only precise but also actionable, providing pinpointed insights and prioritized remediation measures.

This latest addition to KELA’s solution suite allows for more effective integration of Cyber Threat Intelligence (e.g. compromised assets, stolen credentials and identities) and Attack Surface Monitoring (ASM) with third-party risk management (TPRM). This strategic combination enhances KELA’s ability to provide real-time, actionable insights, making it easier for security teams to proactively identify and mitigate potential threats stemming from their supply chains.

Key Features Include:

  • Third Party Attack Surface Monitoring: Conducting comprehensive asset discovery, integrating relevant intelligence findings, and continuously monitoring potential threats on both known and unknown vulnerabilities. This enables a detailed analysis, from an overall risk score down to actionable raw data, providing insights as seen through the eyes of the attacker.
  • Predictive Risk Scoring: The predictive scoring feature, modeled and trained with intelligence on thousands of validated cyber incidents,  provides ongoing monitoring and updates, allowing you to stay ahead of potential threats and take action before an attack occurs
  • Automated Risk Reports: Include high level and in-depth information about intelligence collected by KELA. These reports can be used to share information within third-parties and support prioritization and remediation processes.
Also Read: Cybersecurity Essentials for Aviation and Aerospace

Targeted for both Enterprises and Governmental Institutions: KELA’s advanced Third-Party Risk Management module is crucial for high-end sectors including banking, insurance, IT, computer software, healthcare, finance, telecommunications, and aviation. It provides these industries with essential tools to thoroughly assess and mitigate risks across their digital supply chain. Additionally, for government, law enforcement agencies and national CERTs, this module is instrumental in gauging risk levels per sector, including critical infrastructure and public services, as well as assisting small businesses by providing corrective measures and guidance. This comprehensive approach significantly enhances national security measures.

“As we continue to witness the escalating complexities and the increasing frequency of cyber threats, the need for an advanced third-party risk management solution has become more apparent than ever,” said David Carmiel, KELA’s CEO and co-founder. “In collaboration with our customers, we recognized that the need extends beyond risk assessment; there is a strong demand for real, validated actionable intelligence to effectively mitigate these external risks. Our new TPRM module is specifically designed to answer this need and fortify organizations’ defenses against the vulnerabilities introduced by third parties.”

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Independent Research Firm Names McAfee a Leader in Data Security Platforms Report

CIO Influence News Desk

Sherweb First CSP to Offer SentinelOne’s Purple AI to Managed Service Providers

Business Wire

1NCE And Amazon Web Services Join Forces For a Global IoT Platform