Pinup: BitSight Provides Comprehensive Ratings System For Business-Tech Security

Pinup: BitSight Provides Comprehensive Ratings System For Business-Tech Security

BitSightLogo

Conducting business and communicating with business associates over the internet can be dangerous. From corporate competitors looking to gain insight into your proprietary information, to the black-hat hacker, whose primary goal is chaos and destruction, the internet can many times be just as treacherous as it is helpful.

This certainty is what makes a service like BitSight such a welcome addition to virtually any company that does business in cyberspace.

BitSight was founded in 2011 by MIT-graduates, Nagarjuna Venna and Stephen Boyer. In 2012, BitSight was joined by former Q1 Labs veteran, Shaun McConnon. Since its inception, BitSight has received over $24 million in series-A funding from a veritable who’s who of venture capital firms. These include Globespan Capital Partners, Menlo Ventures, Flybridge Capital Partners, and Commonwealth Capital Ventures.

We are excited to bring a new evidence based approach to quantifying security risks while providing our customers with actionable insight to quickly respond to emerging data security threats,” says CEO, Shaun McConnon “BitSight is well positioned to drive innovation in the security risk management market. We are continuing to hire the best people in their fields of expertise to enhance BitSight’s innovative platform.”

Bitsight’s goal is to deliver a clear method, which measures just how safe and secure your company’s data actually is. Primary methods that make this possible are:

BitSight Security Rating Platform

The BitSight Security Rating Platform is designed to gather mountains of data on a daily basis, using sensors that have been deployed across the world. Once this data has been collected, it is separated into several categories based on perceived risk. These risks include the usual suspects, such as botnets, spam and malware.

Once these classifications have been made, BitSight maps the data to your known network. Once completed, the data and paths are analyzed for how often these problems can occur based on your current network configuration. This information is used to assign a rating on just how secure your network is.

Ratings

BitSight has developed a ratings system that is similar in many ways to the way credit scores work with average individuals. Rating numbers range between 250 to 900, with higher scores denoting a more secure network.

The ratings provided by the BitSight Security Rating Platform are very flexible and can be configured to gauge things by whole company to individual user groups. These ratings can then be used to evaluate performance, as well as help leverage third-party risk management and cyber-insurance policies.

While security will always be a matter of concern when dealing with virtual business activities, a service like BitSight can provide clear indication of just how secure your business actually is.

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Comics
The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…