SureCloud, the provider of cloud-based, Integrated Risk Management solutions, has been placed on Gartner’s Magic Quadrant for IT Vendor Risk Management Tools for the first time after being recognised on Gartner’s Magic Quadrant for Integrated Risk Management Solutions back in July 2019. The quadrant names 16 key solution vendors identified by Gartner as offering vendor risk management (VRM) solutions.

VRM solutions enable organisations to accurately ascertain the security and compliance risks associated with their IT third-parties, creating a centralised register of these parties and integrating this with wider risk management processes.

Highly configurable software-as-a-service

We think it underlines our ability to offer a truly comprehensive third-party risk management solution"

Richard Hibbert, CEO and Co-Founder at SureCloud, said: “We are delighted that SureCloud has been included in the Magic Quadrant for IT Vendor Risk Management Tools; we think it underlines our ability to offer a truly comprehensive third-party risk management solution.”

Our flexible, scalable and highly configurable software-as-a-service (SaaS) delivery model, combined with managed service options, is proving particularly attractive to organisations looking to build a robust, central view of their vendor assurance program.”

Security and risk management

Third-party risk management is a vital part of any organisation’s cybersecurity posture, with many third parties having access to highly sensitive data and offering criminals a potential route into their organisations. Demonstrating a clear awareness of each third party’s approach to security and risk management is also an increasingly significant element of privacy regulations such as the GDPR.

In response, SureCloud’s Vendor Risk Management solution is designed to offer a smooth and scalable means for organisations to assess and review all their IT third party vendors for potential risks.

IT risk management processes

The SureCloud Vendor Risk Management solution offers:

  • A centralised register of all third-party IT vendors, giving a holistic view of risk
  • A dynamically generated risk-assessment for each third party, ensuring they are only asked questions which apply to them
  • Automated third party notifications and response reporting.
  • Full integration with wider IT risk management processes and data privacy programs.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...