www.prevalent.net Open in urlscan Pro
192.124.249.17  Public Scan

Submitted URL: https://prevalent-security.com/
Effective URL: https://www.prevalent.net/
Submission: On September 05 via automatic, source certstream-suspicious

Form analysis 4 forms found in the DOM

https://www.prevalent.net/search/results/

<form class="search-form js-search-form" action="https://www.prevalent.net/search/results/">
  <input type="search" name="q" placeholder="Search">
  <button type="submit" value="Submit">
    <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 20 20">
      <g fill="none">
        <path d="M11.3 0C15.8 0 19.5 3.7 19.5 8.3 19.5 12.5 16.3 15.9 12.3 16.4L12.3 22.4 10.3 22.4 10.3 16.4C6.2 15.9 3 12.5 3 8.3 3 3.7 6.7 0 11.3 0ZM11.3 1.5C7.5 1.5 4.5 4.5 4.5 8.3 4.5 12 7.5 15 11.3 15 15 15 18 12 18 8.3 18 4.5 15 1.5 11.3 1.5Z"
          fill="#101820" transform="translate(11.250000, 11.175000) rotate(-45.000000) translate(-11.250000, -11.175000)"></path>
      </g>
    </svg> </button>
</form>

https://www.prevalent.net/search/results/

<form class="search-form js-search-form" action="https://www.prevalent.net/search/results/">
  <input type="search" name="q" placeholder="Search">
  <button type="submit" value="Submit">
    <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 20 20">
      <g fill="none">
        <path d="M11.3 0C15.8 0 19.5 3.7 19.5 8.3 19.5 12.5 16.3 15.9 12.3 16.4L12.3 22.4 10.3 22.4 10.3 16.4C6.2 15.9 3 12.5 3 8.3 3 3.7 6.7 0 11.3 0ZM11.3 1.5C7.5 1.5 4.5 4.5 4.5 8.3 4.5 12 7.5 15 11.3 15 15 15 18 12 18 8.3 18 4.5 15 1.5 11.3 1.5Z"
          fill="#101820" transform="translate(11.250000, 11.175000) rotate(-45.000000) translate(-11.250000, -11.175000)"></path>
      </g>
    </svg> </button>
</form>

<form class="subscribe-form mktoForm mktoHasWidth mktoLayoutLeft is-ready" data-category="Footer" data-action="Click" data-label="Subscribe" id="mktoForm_1019" data-id="1019" novalidate="novalidate">
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoOffset"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth"></div><input id="Email" name="Email" placeholder="Enter your email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="honeypot" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="Website">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor" value="1019"><input type="hidden"
    name="munchkinId" class="mktoField mktoFieldDescriptor" value="652-LJG-176">
</form>

<form class="subscribe-form mktoForm mktoHasWidth mktoLayoutLeft" data-category="Footer" data-action="Click" data-label="Subscribe" data-id="1019" novalidate="novalidate"
  style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

THIS WEBSITE USES COOKIES

We use cookies to improve your experience on our site and to show you relevant
advertising. You consent to our cookies if you continue to use our site. To find
out more, read our privacy policy and cookie policy.
[#OOI_PERSONAL_INFORMATION#]
Use necessary cookies only OK Show details
OK
Use necessary cookies only Allow selection Allow all cookies
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (8) Preferences (2) Statistics (4) Marketing (22) Unclassified (0)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryType__cf_bmMarketoThis cookie is used to distinguish
between humans and bots. This is beneficial for the website, in order to make
valid reports on the use of their website.1 dayHTTPBIGipServer#MarketoUsed to
distribute traffic to the website on several servers in order to optimise
response times.SessionHTTPli_gcLinkedInStores the user's cookie consent state
for the current domain2 yearsHTTPCookieConsentCookiebotStores the user's cookie
consent state for the current domain1
yearHTTPCRAFT_CSRF_TOKENwww.prevalent.netEnsures visitor browsing-security by
preventing cross-site request forgery. This cookie is essential for the security
of the website and visitor. SessionHTTPvisitorIdws.zoominfo.comPreserves users
states across page requests.1 yearHTTPCONSENT [x2]YouTubeUsed to detect if the
visitor has accepted the marketing category in the cookie banner. This cookie is
necessary for GDPR-compliance of the website. 5979 daysHTTP

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypelang [x2]LinkedInSet by LinkedIn when a web page
contains an embedded "Follow us" panel.SessionHTTP

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypeAnalyticsSyncHistoryLinkedInUsed in connection with
data-synchronization with third-party analysis service. 29
daysHTTP_gaGoogleRegisters a unique ID that is used to generate statistical data
on how the visitor uses the website.2 yearsHTTP_gatGoogleUsed by Google
Analytics to throttle request rate1 dayHTTP_gidGoogleRegisters a unique ID that
is used to generate statistical data on how the visitor uses the website.1
dayHTTP

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypeads/ga-audiencesGoogleUsed by Google AdWords to
re-engage visitors that are likely to convert to customers based on the
visitor's online behaviour across websites.SessionPixelbcookieLinkedInUsed by
the social networking service, LinkedIn, for tracking the use of embedded
services.2 yearsHTTPbscookieLinkedInUsed by the social networking service,
LinkedIn, for tracking the use of embedded services.2 yearsHTTPlidcLinkedInUsed
by the social networking service, LinkedIn, for tracking the use of embedded
services.1 dayHTTPUserMatchHistoryLinkedInUsed to track visitors on multiple
websites, in order to present relevant advertisement based on the visitor's
preferences. 29 daysHTTP_ccmsiBomboraUsed to track which users have shown
interest in what job postings. The cookie ensures that the most relevant job
postings are shown to the specific user. PersistentHTMLvuidVimeoCollects data on
the user's visits to the website, such as which pages have been read.2
yearsHTTPVISITOR_INFO1_LIVEYouTubeTries to estimate the users' bandwidth on
pages with integrated YouTube videos.179 daysHTTPYSCYouTubeRegisters a unique ID
to keep statistics of what videos from YouTube the user has
seen.SessionHTTPyt.innertube::nextIdYouTubeRegisters a unique ID to keep
statistics of what videos from YouTube the user has
seen.PersistentHTMLyt.innertube::requestsYouTubeRegisters a unique ID to keep
statistics of what videos from YouTube the user has
seen.PersistentHTMLytidb::LAST_RESULT_ENTRY_KEYYouTubeStores the user's video
player preferences using embedded YouTube
videoPersistentHTMLyt-remote-cast-availableYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-cast-installedYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-connected-devicesYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-device-idYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-fast-check-periodYouTubeStores the user's video
player preferences using embedded YouTube
videoSessionHTMLyt-remote-session-appYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-session-nameYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLvisitorGuid_235968chatserver1.comm100.ioPending2914039
daysHTTPcomm100_visitor_235968Comm100PendingPersistentHTMLcomm100_visitorguid_235968Comm100Pending2914039
daysHTTP

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

We do not use cookies of this type.

 [#IABV2_LABEL_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]
Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.
Cookie declaration last updated on 8/18/21 by Cookiebot

The 2021 Gartner Magic Quadrant for IT VRM Tools is now available! Get your
complimentary copy here!

 * Solutions
   Third-Party Risk Management
   
    * Sourcing & Selection
      
      
   
    * Intake & Onboarding
      
      
   
    * Inherent Risk Scoring
      
      
   
    * Vendor Risk Assessment
      
      
   
    * Vendor Risk Monitoring
      
      
   
    * SLA & Performance Management
      
      
   
    * Offboarding & Termination
      
      
   
    * Integrations
      
      
   
    * Prevalent for Vendors
      
      
   
   Procurement & Sourcing
   
    * ABAC & Ethics
      
      
   
    * Diversity
      
      
   
    * ESG
      
      
   
    * Modern Slavery
      
      
   
    * Pre-Contract Due Diligence
      
      
   
    * Reputational & Financial Monitoring
      
      
   
    * Supply Chain Resilience
      
      
   
   Compliance
   
    * Compliance Overview
      
      Browse the full list of compliance capabilities Prevalent offers.
   
      Featured Regulations
   
    * CCPA
   
    * CMMC
   
    * EBA Outsourcing Guidelines
   
    * Executive Order on Improving the Nation's Cybersecurity
   
    * GDPR
   
    * ISO Information Security Standards
   
    * NIST SP 800-53, SP 800-161 & CSF
   
    * PCI DSS
   
   Privacy & Additional Use Cases
   
    * Data Privacy
      
      
   
    * Governance, Risk & Compliance (GRC)
      
      
   
    * Internal IT Assessment
      
      

 * Products
   Third-Party Risk Software
   
   Gain a 360-degree view of third-party risk with our self-service SaaS
   platform for unified assessment and monitoring.
   
    * Prevalent TPRM Platform
      
      Identify, analyze and remediate risk throughout the vendor lifecycle.
   
    * Vendor Risk Assessment
      
      Automate third-party risk survey collection and analysis.
   
    * Vendor Risk Monitoring
      
      Gain insights into vendor cyber, business and financial risks.
   
    * TPRM Jump Start
      
      Discover and assess third parties in 30 days or less.
   
   Procurement & Privacy Software
   
   Accelerate due diligence, privacy and compliance evaluations throughout your
   extended enterprise.
   
    * Procurement Jump Start
      
      Conduct due diligence for ABAC, ESG, SLA performance and more.
   
    * Privacy Jump Start
      
      Assess adherence to GDPR, CCPA, NYDFS and more.
   
   Free Tools
   
   Get complimentary risk reports and monitoring for your company and its
   vendors, suppliers and other third parties.
   
    * Risk Report
      
      Get a free risk report for your company or one of your vendors.
   
    * Continuous Risk Monitoring
      
      Get free breach, reputation, business and financial monitoring for 20
      vendors.
   
    * Maturity Assessment
      
      Get customized recommendations for evolving your TPRM program.
   
   Analyst Report: Gartner Magic Quadrant for IT Vendor Risk Management
   
   
 * Services
   
   Third-Party Risk Services
   
   Let us handle the manual labor of TPRM, and collaborate with our experts to
   mature your program.
   
    * Risk Assessment Services
      
      Outsource risk assessment, analysis and remediation across your
      third-party ecosystem.
   
    * Professional Services
      
      Build, grow and optimize your third-party risk management program.
   
    * Third-Party Incident Response New
      
      Quickly discover, score and remediate risks from vendor breaches.
   
   Managed Services Packages
   
   Offload your assessment, monitoring and due diligence activities to our
   experts with these affordable packages.
   
    * Supplier Risk Monitoring
      
      Outsource business and financial risk monitoring of your vendors and
      suppliers.
   
    * Procurement Due Diligence
      
      Outsource monitoring and assessment of prospective vendors against ABAC,
      ESG, SLA requirements and more.
   
   Vendor Intelligence Networks
   
   Quickly scale your TPRM program by accessing libraries of comprehensive
   vendor intelligence profiles.
   
    * Global Vendor Network
      
      
   
    * Legal Vendor Network
      
      
   
    * Healthcare Vendor Network
      
      
   
    * Third-Party Marketplace
      
      Vendors: Conduct and share self-assessments!
   
   Get a Free TPRM Maturity Assessment
   
   
 * Who Benefits
   
   Teams
   
    * Risk Management
      
      
   
    * Procurement & Sourcing
      
      
   
    * Security & IT
      
      
   
    * Audit & Compliance
      
      
   
    * Data Privacy
      
      
   
   Industries
   
    * Finance
      
      
   
    * Healthcare
      
      
   
    * Insurance New
      
      
   
    * Legal
      
      
   
    * Manufacturing New
      
      
   
    * Retail
      
      
   
    * All Industries
      
      Learn more about our customers across all industries.
   
   Vendors & Suppliers
   
    * Prevalent for Vendors
      
      
   
    * Vendor Security & Privacy
      
      
   
    * Third-Party Marketplace
      
      Conduct and share self-assessments!
   
   The 2021 Third-Party Risk Management Study - See the Results!
   
   
 * About
   About
   
    * About Us
      
      Meet our team of industry veterans and our visionary board.
   
    * Investors
      
      Learn about the investors who help to fuel our growth.
   
    * Careers
      
      View job opportunities and see if Prevalent is right for you.
   
    * News & Press Releases
      
      Read the latest news about Prevalent and our solutions.
   
    * Events
      
      Join us at an upcoming conference or industry event.
   
   Featured News & Events
   
    * News
      
      Prevalent Named a Leader in the 2021 Gartner® Magic Quadrant™ for IT
      Vendor Risk Management Tools
      
      
   
    * News
      
      Platform Essentials Now Includes Unlimited Ransomware and ESG Assessments
      
      
   
    * News
      
      Prevalent Achieves Record-Breaking First Half of 2021
      
      
   
    * Event
      
      Cyber Security Digital Summit for Financial Services
      
      

 * Resources
   
   Resources
   
    * Blog
      
      Get insights and guidance on third-party risk management.
   
    * Content Library
      
      Access analyst reports, white papers, videos and more.
   
    * Customers & Case Studies
      
      Hear how customers benefit from Prevalent solutions.
   
    * Risk Calculator
      
      How mature is your third-party risk management program?
   
    * Solution Comparison
      
      See how Prevalent stacks up against the competition.
   
    * Free TPRM Tools New
      
      Get a free TPRM maturity assessment, a comprehensive risk monitoring
      report, or business & financial monitoring for 20 vendors.
   
   Featured Resources
   
    * White Paper
      
      The 2021 Third-Party Risk Management Study
   
    * White Paper
      
      Procurement Risk Playbook: How to Win the Third-Party Game
   
    * White Paper
      
      Best Practices Guide: Five Steps to Proactive Third-Party Risk Management


 * Contact
 * Partner
 * 
 * Request Demo

Request Demo





PREVALENT NAMED A LEADER IN GARTNER® MAGIC QUADRANT™

The 2021 Gartner Magic Quadrant for IT Vendor Risk Management Tools reviews 17
VRM providers. Get your complimentary access to this in-depth report now!

The 2021 Gartner Magic Quadrant for IT Vendor Risk Management Tools reviews 17
VRM providers. Get your complimentary access to this in-depth report now!

 * Read the Gartner Report
 * Discover Our Platform




YOU’RE IN GOOD COMPANY. JOIN THE HUNDREDS OF BUSINESSES USING PREVALENT.

 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 

Get to Know the Prevalent Platform

See how Prevalent can help you gain unmatched visibility into third-party risk
with this 2-minute video introduction.


A COMPLETE THIRD-PARTY VENDOR RISK MANAGEMENT SOLUTION

 * Networks
 * Services
 * Platform
 * Next Steps

 * 

 * GAIN INSTANT ACCESS TO VENDOR RISK INTELLIGENCE
   
   Our networks provide on-demand risk intelligence for over 10,000 vendors.
   These libraries leverage the power of the Prevalent community to deliver
   historical and real-time insights into both cyber and business risks from
   over 500,000 sources. With Prevalent Vendor Risk Networks, you can quickly
   scale your TPRM program with instant access to vendor risk scores and
   supporting reports.
   
   Vendor Risk Intelligence Networks

 * FREE YOUR TEAM TO FOCUS ON WHAT MATTERS MOST
   
   Our services team is dedicated to freeing you of the burdens of third-party
   risk management. We can handle everything from onboarding vendors and
   conducting assessments, to identifying risks and tracking remediation. You
   skip the hard work and get the intelligence and reports you need to focus on
   vendor strategy and overall risk reduction.
   
   Vendor Risk Assessment Services

 * UNIFY VENDOR MANAGEMENT, ASSESSMENT AND MONITORING
   
   The Prevalent Third-Party Risk Management Platform unifies vendor management,
   risk assessment and threat monitoring to deliver a 360-degree view of risk.
   The platform makes it easy to onboard vendors; assess them against
   standardized and custom questionnaires; correlate assessments with external
   threat data; reveal, prioritize and report on the risk; and facilitate the
   remediation process.
   
   Third-Party Risk Management Platform

 * MANAGE THIRD-PARTY RISK WITHOUT THE HEADACHES
   
   Regardless of where you are today, Prevalent can help you build a third-party
   risk management program with unmatched visibility, efficiency and scale.
   We’ll work with you to find a mix of managed services, network membership
   and/or TPRM platform access that works best for your organization. You’ll
   gain a fast time to value, be equipped to make intelligence-driven decisions,
   and measurably reduce vendor-related risk – all with fewer headaches for you
   and your team.
   
   Request a TPRM Solution Demo

We appreciate not only the platform, but also the willingness to stand behind it
and enhance it with human interaction.

— Information Security Analyst, Financial Services Company

Read Prevalent case studies


DISCOVER THE PREVALENT APPROACH TO THIRD-PARTY VENDOR RISK MANAGEMENT

 * SMART
   
   Get the data you need to make better decisions. We not only gather and
   correlate vendor intelligence from hundreds of thousands sources, but also
   present in a quantifiable and contextual way.

 * UNIFIED
   
   Increase team efficiency and break down silos. We unify risk assessment and
   threat monitoring with a TPRM platform that enables collaboration with
   vendors to prioritize and reduce risk.

 * PRESCRIPTIVE
   
   Partner with us to evolve and scale your program. Our solutions are backed by
   customer success, managed services and professional services teams that can
   help you navigate every step.

Five Steps to Proactive Third-Party Risk Management

Our free guide reveals 5 best practices for achieving a complete third-party
risk management solution implementation. See what we've learned in our 15+ years
of experience working with hundreds of customers.

Download the Report

Featured Resources
 * Blog Post
   
   WHAT IS THIRD-PARTY RISK MANAGEMENT: A DEFINITIVE GUIDE
   
   Third-Party Risk Management (TPRM) has advanced from being an annual
   checklist exercise to a critical daily...

 * White Paper
   
   THE 2021 THIRD-PARTY RISK MANAGEMENT STUDY
   
   Are you ready to navigate the dangerous waters of third-party risk
   management? Use this report to...

 * Blog Post
   
   SUPPLY CHAIN RISK MANAGEMENT: THE DEFINITIVE GUIDE
   
   Supply Chain Risk Management (SCRM) is increasingly raised as a board-level
   topic as business continuity concerns...

 * Ready to get started?
 * Schedule a personalized solution demonstration to see if Prevalent is a fit
   for you.
 * Request a Demo

 * About TPRM
 * What Is Third-Party Risk Management: A Guide

 * TPRM Solutions
 * Sourcing & Selection
 * Intake & Onboarding
 * Inherent Risk Scoring
 * Vendor Risk Assessment
 * Vendor Risk Monitoring
 * SLA & Performance Management
 * Offboarding & Termination
 * Integrations
 * Prevalent for Vendors

 * TPRM Software
 * TPRM Platform
 * Vendor Risk Assessment
 * Vendor Risk Monitoring
 * TPRM Jump Start

 * Procurement Solutions
 * ABAC & Ethics
 * Diversity
 * ESG
 * Modern Slavery
 * Pre-Contract Due Diligence
 * Reputational & Financial Risk Monitoring
 * Supply Chain Resilience

 * Privacy & Additional Use Cases
 * Data Privacy
 * GRC
 * Internal IT Assessment

 * Procurement & Privacy Software
 * Procurement Jump Start
 * Privacy Jump Start

 * Compliance Solutions
 * Compliance Capabilities
 * Bribery Act of 2010
 * CCPA
 * Cloud Security Alliance CAIQ
 * CMMC
 * CTSCA
 * EBA Outsourcing Guidelines
 * EO on Improving the Nation's Cybersecurity
 * EU Corp Due Diligence Act
 * FCA FG 16/5
 * FCPA
 * FFIEC IT Exam Handbook
 * GDPR
 * HIPAA
 * ISO 27001, 27002, 27018, 27036-2, 27701
 * Modern Slavery Act of 2015
 * NERC CIP
 * NIST 800-53, 800-161, CSF
 * NY SHIELD Act
 * NY CRR 500
 * OCC Bulletins
 * PCI DSS
 * SOC 2

 * Vendor Risk Networks
 * Vendor Networks Overview
 * Global Vendor Network
 * Legal Vendor Network
 * Healthcare Vendor Network
 * Third-Party Marketplace

 * Third-Party Risk Services
 * Vendor Risk Assessment Services
 * Professional Services
 * Third-Party Incident Response Service

 * Managed Service Packages
 * Supplier Risk Monitoring
 * Procurement Due Diligence

 * Who Benefits
 * Risk Management
 * Procurement & Sourcing
 * Security & IT
 * Audit & Compliance
 * Data Privacy

 * Industries
 * Finance
 * Healthcare
 * Insurance
 * Legal
 * Manufacturing
 * Retail

 * Vendors & Suppliers
 * Prevalent for Vendors
 * Vendor Security & Privacy
 * Self-Assessments

 * Contact
 * Contact Us
 * Request a Demo
 * Get Customer Support
 * Become a Partner

 * About
 * About Us
 * Careers
 * Events
 * News
 * Investors

 * Resources
 * Blog
 * Customers & Case Studies
 * Free Tools
 * Solution Comparison
 * Webinars
 * White Papers

*






Subscribe

Thanks for your submission!



Privacy Policy
Cookie Policy
Vendor Policy
© 2021 Prevalent, Inc