Tandem Phishing

Phishing attacks are one of the top cybersecurity threats to today’s organizations. Phishing testing is a fast and practical way to train employees and reduce your exposure to data breaches.To help organization improve their cybersecurity posture from social engineering attacks, Tandem developed a Phishing solution to assist customers in easily creating and sending realistic phishing s…

Tandem Security and Compliance Software

Tandem is a Software as a Service (SaaS) solution initially designed specifically for financial institutions (banks, credit unions, trust companies, and mortgage companies) to help increase their cybersecurity, stay in compliance, and lower overhead costs. Users can choose from 11 unique products that work well on their own, but also integrate together to provide a full-scope information s…

Tandem Risk Assessment

Ensuring the confidentiality, integrity, and availability of information is vital to the operations of any organization. An effective IT risk management process should identify, measure, control and monitor risk. Tandem streamlines this process, so clients can focus on reducing the organization’s vulnerabilities and threat exposure.Tandem's information security risk assessment walks us…

Tandem Security and Compliance Software

Tandem is a Software as a Service (SaaS) solution helping companies increase their cybersecurity, stay in compliance, and lower overhead costs. Users can choose from 11 unique products that work well on their own, but also integrate together to provide full-scope information security and cybersecurity solutions. With more than 27,000 active users representing over 1,400 different customers…

Tandem Vendor Management Software

Companies rely on third parties for various software, products, and services. The use of third parties or service providers does not reduce the responsibility of the Board of Directors and senior management to ensure the third-party products and/or services are safe and comply with applicable laws, regulations, and security best practices. This is accomplished through vendor management. …

Tandem Vendor Management Software

Companies rely on vendors for various software, products, and services. The use of vendors or service providers does not reduce the responsibility of the Board of Directors and senior management to ensure the third-party products and/or services are safe and comply with applicable laws, regulations, and security best practices. This is accomplished through vendor management.Tandem offe…

Tandem Cybersecurity Assessment Tool

The Tandem Cybersecurity Assessment Tool is a Software as a Service (SaaS) designed to help financial institutions complete the FFIEC cybersecurity assessment. Offered in both free and pro versions, the software currently helps more than 1,000 banks, credit unions, and mortgage companies. This product provides an automated way to answer questions provided by the FFIEC CAT, analyze the inst…

Persona: The Industry’s First Unified Identity Platform

Persona is the industry’s first unified identity platform that helps businesses mitigate online fraud and meet ever-evolving compliance standards. Persona’s unique approach provides the building blocks to build and operate a business’ unique identity process end-to-end. Under the hood, Persona connects, centralizes and orchestrates all fragmented identity data, disparate systems and identi…

CSIOS Corporation

• CSIOS Corporation (hereafter “CSIOS”) is a veteran–owned business provider of global cyberspace operations (defensive, offensive, and Information network operations) and cybersecurity services to U.S. Federal customers worldwide. In 2021, CSIOS retained its status as a global trendsetter maintaining its Cyberspace Operations Division appraised and certified to operate under Capability Ma…

Onward Security HERCULES SecFlow

HERCULES SecFlow is a product security management system, providing a comprehensive security vulnerability database, and pro-active security event monitoring. It aims to assist users to meet different standard or compliance requirements for ISO 27001, ISO 27034, IEC 62443, OpenSAMM, and NIST SP800-64. Meanwhile, taking SSDLC into consideration, it helps users ensure the practices in phases…

FTI Consulting, Cybersecurity and Data Privacy Communications

FTI Consulting’s Cybersecurity and Data Privacy Communications practice is one of the premier cybersecurity communications groups in the industry. The practice provides expert crisis communications counsel and support throughout the entire lifecycle of a cyber incident, helping companies mitigate risks and preserve their reputation before, during and after the incident. The practice levera…

Cobalt

Cobalt provides a Pentest as a Service (PtaaS) platform that is modernizing the traditional, static penetration testing model. With a globally distributed team Cobalt is transforming pentesting by providing streamlined processes, developer integrations, and on-demand pentesters who have undergone rigorous vetting. With Cobalt, customers can build their pentest program in as little as five …