Pinup: BitSight Provides Comprehensive Ratings System For Business-Tech Security

Pinup: BitSight Provides Comprehensive Ratings System For Business-Tech Security

BitSightLogo

Conducting business and communicating with business associates over the internet can be dangerous. From corporate competitors looking to gain insight into your proprietary information, to the black-hat hacker, whose primary goal is chaos and destruction, the internet can many times be just as treacherous as it is helpful.

This certainty is what makes a service like BitSight such a welcome addition to virtually any company that does business in cyberspace.

BitSight was founded in 2011 by MIT-graduates, Nagarjuna Venna and Stephen Boyer. In 2012, BitSight was joined by former Q1 Labs veteran, Shaun McConnon. Since its inception, BitSight has received over $24 million in series-A funding from a veritable who’s who of venture capital firms. These include Globespan Capital Partners, Menlo Ventures, Flybridge Capital Partners, and Commonwealth Capital Ventures.

We are excited to bring a new evidence based approach to quantifying security risks while providing our customers with actionable insight to quickly respond to emerging data security threats,” says CEO, Shaun McConnon “BitSight is well positioned to drive innovation in the security risk management market. We are continuing to hire the best people in their fields of expertise to enhance BitSight’s innovative platform.”

Bitsight’s goal is to deliver a clear method, which measures just how safe and secure your company’s data actually is. Primary methods that make this possible are:

BitSight Security Rating Platform

The BitSight Security Rating Platform is designed to gather mountains of data on a daily basis, using sensors that have been deployed across the world. Once this data has been collected, it is separated into several categories based on perceived risk. These risks include the usual suspects, such as botnets, spam and malware.

Once these classifications have been made, BitSight maps the data to your known network. Once completed, the data and paths are analyzed for how often these problems can occur based on your current network configuration. This information is used to assign a rating on just how secure your network is.

Ratings

BitSight has developed a ratings system that is similar in many ways to the way credit scores work with average individuals. Rating numbers range between 250 to 900, with higher scores denoting a more secure network.

The ratings provided by the BitSight Security Rating Platform are very flexible and can be configured to gauge things by whole company to individual user groups. These ratings can then be used to evaluate performance, as well as help leverage third-party risk management and cyber-insurance policies.

While security will always be a matter of concern when dealing with virtual business activities, a service like BitSight can provide clear indication of just how secure your business actually is.

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…