Vendor Alerts
BREACHVendor: CloudStorage Pro · Customer data exposed · 2.1M records · Detected 4h ago RISK SPIKEPaymentGateway Ltd · Score dropped 78→41 · Ransomware infection reported EXPOSUREHR Software Co · Misconfigured S3 bucket · Employee PII accessible CVECRM Vendor · Unpatched CVE-2024-1234 · CVSS 9.1 · 14 days unpatched BREACHVendor: CloudStorage Pro · Customer data exposed · 2.1M records · Detected 4h ago RISK SPIKEPaymentGateway Ltd · Score dropped 78→41 · Ransomware infection reported EXPOSUREHR Software Co · Misconfigured S3 bucket · Employee PII accessible CVECRM Vendor · Unpatched CVE-2024-1234 · CVSS 9.1 · 14 days unpatched
AI Powered Full Stack Cyber Resilience
Gordon Third Party Risk · by Mitigata

Your Supply Chain Has a
Hidden Back Door.

Gordon AI continuously monitors the cyber posture of every vendor, supplier, and partner in your ecosystem — scoring their risk, detecting breaches in real time, and alerting you before their problem becomes your breach. Stop reacting. Start predicting.

Continuous Vendor Risk Monitoring — real-time security posture scoring, not annual questionnaires
Instant Risk Alerts — notified immediately when any vendor's security posture deteriorates
Regulatory TPRM Compliance — built-in frameworks for RBI, SEBI, DPDP, and ISO 27001
60%
Breaches via vendors
<2 hrs
Breach alert time
500+
Vendors monitored
Gordon TPRM — Vendor Risk Map
LIVE
Platform Capabilities

Comprehensive TPRM Capabilities.
Real-time vendor intelligence, not annual questionnaires.

Continuous Risk Scoring

Every vendor receives a live risk score (0–100) updated daily based on their external attack surface, breach history, dark web exposure, CVE patching behaviour, and security certifications.

Vendor Breach Detection

Mitigata monitors dark web forums, breach databases, and threat intelligence feeds for any mention of your vendors. You're alerted within hours of a vendor breach — not when you read about it in the news.

Automated Security Questionnaires

Send and track security questionnaires (SIG Lite, CAIQ, custom) to vendors automatically. Mitigata pre-fills answers from publicly available data, reducing vendor response time significantly.

Fourth-Party Risk Visibility

Mitigata maps your vendors' vendors — identifying concentration risk and hidden dependencies. Know when a single cloud provider failure or breach could cascade through your entire supply chain.

Regulatory TPRM Reports

Generate TPRM reports pre-formatted for RBI IT Framework, SEBI CSCRF, DPDP Act, and ISO 27001 Annex A.15 — with evidence packages ready for auditors and board presentations.

Contract Risk Intelligence

Mitigata analyses vendor contracts and SLAs to flag missing security clauses — right to audit, breach notification timelines, data processing agreements, and subprocessor controls — before you sign.

How It Works

Onboard. Score. Monitor. Act.
Continuously.

LIVE VENDOR RISK ASSESSMENT FLOW
MONITORING
Critical Risk (<30)
High Risk (30–59)
Medium (60–79)
Healthy (≥80)
01

Import Vendor List

Upload your vendor list via CSV, connect your procurement system, or let Gordon auto-discover vendors from your DNS, email headers, and network traffic. Onboard 500 vendors in minutes.

02

Instant Risk Scoring

Gordon immediately scores every vendor across 200+ signals — attack surface exposure, breach history, dark web mentions, SSL/TLS hygiene, DNS security, and regulatory compliance status.

03

Continuous Monitoring

Scores update daily. You receive real-time alerts for score drops, breach detections, new CVEs affecting vendor infrastructure, and dark web mentions — via email, Slack, or webhook.

04

Remediate & Report

Send remediation requests directly to vendors from the Gordon console. Track their progress, enforce SLAs, and generate compliance reports for your board and regulators — all in one place.

Real-World Impact

Vendor breaches stopped.
Before they reach you.

INSURANCE

IRDAI TPRM Compliance

CHALLENGE

A large insurance company had 340 vendors but no systematic way to assess their cyber risk for IRDAI compliance. Manual questionnaires took 3 months to complete annually.

OUTCOME

Gordon onboarded all 340 vendors in 2 hours, scored them immediately, and identified 12 critical-risk vendors requiring immediate action. IRDAI compliance report generated in one click.

3mo → 2hr
Assessment time
340
Vendors scored
12
Critical risks found
MANUFACTURING

Supply Chain Breach Prevention

CHALLENGE

A manufacturer's logistics software vendor was breached. Without monitoring, they only found out 11 days later when their own systems showed anomalous access patterns.

OUTCOME

After deploying Gordon, when a different vendor was breached 6 months later, they received an alert within 90 minutes — isolated the integration, rotated credentials, and avoided any data exposure.

90 min
Alert time
11d → 0
Exposure window
₹0
Breach cost
FINTECH

RBI Outsourcing Guidelines

CHALLENGE

An NBFC needed to demonstrate continuous vendor risk monitoring for RBI's outsourcing guidelines but had no tooling — relying on spreadsheets and annual reviews.

OUTCOME

Gordon provided continuous monitoring with audit-ready logs, automated RBI-format reports, and a real-time dashboard the RBI examiner could access directly during the inspection.

Pass
RBI inspection
0
Audit findings
Real-time
Monitoring
Pricing

Full-Stack Cyber Resilience, Powered by AI.

Choose the plan that fits your team. Upgrade or cancel anytime.

Monthly
Annual SAVE VS MONTHLY
Free
$0
15-day trial
 

Explore the platform with limited access. No credit card required.

Get Started
Mid-Market
$33,820
/yr
Save ~$6,764 vs monthly

For companies with 100–500 employees. Expanded limits across all modules.

Start Free Trial
Enterprise
$66,070
/yr
Save ~$13,214 vs monthly

For large enterprises 500+ employees. Unlimited scale, dedicated support, and custom SLAs.

Talk to Sales
Included Not available limit = Usage limit
Features Free Startup
$1,787/mo
Mid-Market
$3,382/mo
Enterprise
$6,607/mo
Attack Surface Monitoring12 scans/year
Monitored Assets (Domains, IPs, Mobile Apps)3 assets10 assets
Exposed subdomains & open ports
SSL/TLS certificate health
DNS anomalies & misconfigurations
Web technology fingerprinting
CVE & vulnerability scoring
Continuous monitoring & alerts
SOC Monitoring24/7
Monitored EndpointsUpto 500Upto 2,000
AI-powered alert triage
Kill-chain reconstruction (MITRE ATT&CK)
Automated response playbooks
CERT-In 6-hour incident reporting
Threat intelligence (IOCs, Campaigns)50 threats, 20 IOCsUnlimited
Workforce Risk & Security Awareness
Monitored EmployeesUpto 500Upto 2,000
Email phishing simulation
Custom phishing templates
Security awareness training + LMS
Dark Web Monitoring
Monitored Keywords (brand, legal name, vendors)1 keyword5 keywords
Tor forums, paste sites, Telegram channels
Breach databases & data dumps
Ransomware & APT group monitoring
Cloud Security & Billing Monitoring
Cloud Instances Monitored2 instances5 instances
Misconfiguration detection (CIS 572 benchmark)
IAM & privilege escalation checks
S3 / Blob public exposure alerts
Cloud billing tracking & optimisation
GRC & ComplianceAudit charges extra
Compliance Frameworks4 frameworks5 frameworks
Automated control mapping
AI gap assessment & remediation tasks
Policy & procedure auto-generation
Risk register automation
AI-based internal audit & audit-ready reports
Trust center
Third Party Risk Management (TPRM)
Vendors Monitored250 vendors1,000 vendors
AI security questionnaire dispatch & scoring
Continuous external surface scan
Breach & dark web alerts for vendor
Risk rating (A–F) with trend
Gordon AI
AI Credits / Tokens1,000 credits1,000 credits
Auto-generated risk narratives
One-click remediation playbooks
Executive summary generation
AI-assisted questionnaire filling (CRQ)
Threat intelligence summaries
Brand Intelligence & Takedowns
Brand Assets Monitored3 assets, 60 keywords5 assets, 100 keywords
Fake domain / phishing page / typosquat monitoring
Reverse imaging / logo detection
Social media & counterfeit listing monitoring
Takedowns (Rogue app, DMCA, Phishing pages)100 takedowns125 takedowns
Consent Manager (DPDPA)
Unique Consents (website / mobile app users)100K consents500K consents
Granular consent collection & withdrawal
15+ platform integrations
22 Indian language translation (DPDPA Art. 18)
Cookie scanner, data deletion & grievance requests
Google Consent Mode V2 support

All plans include a 15-day free trial — no credit card required.

FAQ

Common questions
answered honestly.

Questionnaires are point-in-time, self-reported, and only as accurate as what vendors choose to disclose. Gordon monitors vendors externally and continuously — checking their actual attack surface, breach history, and dark web exposure without relying on vendor self-assessment. Questionnaires are still useful for contractual purposes; Gordon makes them faster and augments them with objective data.
No. Gordon's external monitoring requires zero vendor participation — we assess vendors from the outside using publicly available signals, the same way an attacker would. This means you get immediate coverage without waiting for vendor cooperation. For questionnaire workflows, vendors receive an email link and can respond through a simple web portal.
Gordon generates compliance reports for RBI IT Framework (outsourcing guidelines), SEBI CSCRF, IRDAI cyber security guidelines, DPDP Act (data processor requirements), ISO 27001 Annex A.15, and SOC 2 vendor management requirements. Reports are pre-formatted for each framework and include evidence packages for auditors.
Fourth-party risk refers to the vendors of your vendors — the subprocessors and sub-contractors that your direct suppliers rely on. The SolarWinds and MOVEit breaches were fourth-party risks: attackers compromised a software supplier's supplier to reach thousands of organisations. Gordon maps these dependencies so you understand your true supply chain exposure.
Upload a CSV with vendor names and domains and Gordon scores all of them within 2 hours. For 500 vendors, the initial scoring is complete within 4 hours. You can also connect your procurement system (SAP Ariba, Coupa, Oracle) for automatic vendor discovery and continuous sync.
Yes. Gordon generates vendor-facing reports that show the specific issues identified and remediation guidance. You can share these directly with vendors to accelerate their remediation — and track their progress in the Gordon console. This collaborative approach typically reduces vendor remediation time by 60% compared to traditional questionnaire-only workflows.
Get Started Today

Your vendors are being
monitored right now.

The question is whether it's Gordon watching over them — or an attacker already inside. Start monitoring your vendors today.

Monitor Your Vendors Book a Demo