Fortune 100: Ransomware Risk Revealed Read more →

The Power of Data That Can Scale

Reduce cyber assessment times from weeks to minutes.

2020 CISO CHOICE AWARD

Winners of the 2020 CISO Choice Award for Risk Management Learn More

What Our Clients Are Saying

Radically Simple Cyber Assessments That Prevent Unrecognized Risk

Easy to Access Saas System

Operationalize with a platform that integrates with questionnaires, vendor management systems and process workflows.

Standards-based Methodology

Automate adherence to cybersecurity compliance requirements and reduce the risk of a breach with a defense in depth approach.

Proactive Support

Our Customer Success and Engineering teams have your back, even before issues surface. That’s why we’ve achieved an audited NPS of 80.

Non-intrusive Scans

The platform uses Open-Source Intelligence (OSINT) and non-intrusive cyber scans to identify potential security risks, without ever touching the target customer.

20 Categories with 400+ Controls

Vulnerabilities and attack patterns identified using 20 categories and 400+ controls, making the Black Kite platform 3x more comprehensive than competitors’.

Uncover Your Ransomware Susceptibility

The only cyber rating platform with a tool to detect the likelihood of a ransomware attack to your organization.

Exclusive Industry Insight

Nearly half of the top 100 automotive manufacturers are highly susceptible to a ransomware attack.

Download Report

The Black Kite Platform

Built from a Hacker’s Perspective
Financial
technical
COMPLIANCE
Risk in Financial Terms
Determines the financial impact of potential breaches for each vendor
Learn More
Technical Cyber Risk Score
Continuously monitors third-party risks and assigns an easy-to-understand letter grade to each vendor
Learn More
Questionnaire & Compliance Correlation
Correlates findings with industry standards to inform compliance requirements
Learn More

Black Kite’s platform was built to provide full visibility into a vendor’s cyber position, using the same open-source intelligence tools and techniques hackers use (data collectors, crawlers, honeypots, etc.) to continuously collect information from internet-wide scanner databases, reputation sites, cyber events, hacker shares, and known vulnerability databases.

Black Kite Ranks #1 in 10 Hot Security Ratings Companies to Watch in 2021

New Video

What CISOs should know about security ratings

Watch the Video

Ready to get started?