Grae Meyer-Gleaves, Chief Information Security Officer, Hollard Insurance Company of Australia
Chet Sharrar, Chief Information Security Officer, Marlette Funding
Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically.
In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
Stop the endless cycle of one-off questionnaire requests. Add completed questionnaires to your Whistic Profile and share it proactively with customers over and over again.
All of your security documentation, certifications, and audits in one place, enabling sales to share it at the right time in the sales process.
Data security is in your control, on your servers
Vendor security not part of the sales process
No time committed to assessing vendor security
The vendor largely controls data security
Security is a consideration in the sales process
Weeks waiting for vendor to respond to Q&A
Regain control & jointly define vendor security
Security is a competitive differentiator
Vendor publishes security profile proactively
“New vendor partnerships die because of failed security assessments…We prioritized education and training across different departments, such as Sales and Marketing, so security and compliance didn’t become a roadblock in proceeding with a vendor.” Director of Compliance & Legal Affairs, Doctor on Demand
reduction in vendor assessment turnaround time
of questionnaire grading is completed within 45 minutes
It’s no secret the number of third-party security incidents continues to rise annually. Last year....LEARN MORE
Recent events in Russia and Ukraine have had significant human impact that cannot be underestimated....LEARN MORE
The HECVAT, or Higher Education Community Vendor Assessment Tool, is a questionnaire framework....LEARN MORE