Vendor Alerts
BREACHVendor: CloudStorage Pro · Customer data exposed · 2.1M records · Detected 4h ago RISK SPIKEPaymentGateway Ltd · Score dropped 78→41 · Ransomware infection reported EXPOSUREHR Software Co · Misconfigured S3 bucket · Employee PII accessible CVECRM Vendor · Unpatched CVE-2024-1234 · CVSS 9.1 · 14 days unpatched BREACHVendor: CloudStorage Pro · Customer data exposed · 2.1M records · Detected 4h ago RISK SPIKEPaymentGateway Ltd · Score dropped 78→41 · Ransomware infection reported EXPOSUREHR Software Co · Misconfigured S3 bucket · Employee PII accessible CVECRM Vendor · Unpatched CVE-2024-1234 · CVSS 9.1 · 14 days unpatched
AI Powered Full Stack Cyber Resilience
Gordon Third Party Risk · by Mitigata

Your Supply Chain Has a
Hidden Back Door.

Gordon AI continuously monitors the cyber posture of every vendor, supplier, and partner in your ecosystem — scoring their risk, detecting breaches in real time, and alerting you before their problem becomes your breach. Stop reacting. Start predicting.

Continuous Vendor Risk Monitoring — real-time security posture scoring, not annual questionnaires
Instant Risk Alerts — notified immediately when any vendor's security posture deteriorates
Regulatory TPRM Compliance — built-in frameworks for RBI, SEBI, DPDP, and ISO 27001
60%
Breaches via vendors
<2 hrs
Breach alert time
500+
Vendors monitored
Gordon TPRM — Vendor Risk Map
LIVE
Platform Capabilities

Comprehensive TPRM Capabilities.
Real-time vendor intelligence, not annual questionnaires.

Continuous Risk Scoring

Every vendor receives a live risk score (0–100) updated daily based on their external attack surface, breach history, dark web exposure, CVE patching behaviour, and security certifications.

Vendor Breach Detection

Mitigata monitors dark web forums, breach databases, and threat intelligence feeds for any mention of your vendors. You're alerted within hours of a vendor breach — not when you read about it in the news.

Automated Security Questionnaires

Send and track security questionnaires (SIG Lite, CAIQ, custom) to vendors automatically. Mitigata pre-fills answers from publicly available data, reducing vendor response time significantly.

Fourth-Party Risk Visibility

Mitigata maps your vendors' vendors — identifying concentration risk and hidden dependencies. Know when a single cloud provider failure or breach could cascade through your entire supply chain.

Regulatory TPRM Reports

Generate TPRM reports pre-formatted for RBI IT Framework, SEBI CSCRF, DPDP Act, and ISO 27001 Annex A.15 — with evidence packages ready for auditors and board presentations.

Contract Risk Intelligence

Mitigata analyses vendor contracts and SLAs to flag missing security clauses — right to audit, breach notification timelines, data processing agreements, and subprocessor controls — before you sign.

How It Works

Onboard. Score. Monitor. Act.
Continuously.

LIVE VENDOR RISK ASSESSMENT FLOW
MONITORING
Critical Risk (<30)
High Risk (30–59)
Medium (60–79)
Healthy (≥80)
01

Import Vendor List

Upload your vendor list via CSV, connect your procurement system, or let Gordon auto-discover vendors from your DNS, email headers, and network traffic. Onboard 500 vendors in minutes.

02

Instant Risk Scoring

Gordon immediately scores every vendor across 200+ signals — attack surface exposure, breach history, dark web mentions, SSL/TLS hygiene, DNS security, and regulatory compliance status.

03

Continuous Monitoring

Scores update daily. You receive real-time alerts for score drops, breach detections, new CVEs affecting vendor infrastructure, and dark web mentions — via email, Slack, or webhook.

04

Remediate & Report

Send remediation requests directly to vendors from the Gordon console. Track their progress, enforce SLAs, and generate compliance reports for your board and regulators — all in one place.

Real-World Impact

Vendor breaches stopped.
Before they reach you.

INSURANCE

IRDAI TPRM Compliance

CHALLENGE

A large insurance company had 340 vendors but no systematic way to assess their cyber risk for IRDAI compliance. Manual questionnaires took 3 months to complete annually.

OUTCOME

Gordon onboarded all 340 vendors in 2 hours, scored them immediately, and identified 12 critical-risk vendors requiring immediate action. IRDAI compliance report generated in one click.

3mo → 2hr
Assessment time
340
Vendors scored
12
Critical risks found
MANUFACTURING

Supply Chain Breach Prevention

CHALLENGE

A manufacturer's logistics software vendor was breached. Without monitoring, they only found out 11 days later when their own systems showed anomalous access patterns.

OUTCOME

After deploying Gordon, when a different vendor was breached 6 months later, they received an alert within 90 minutes — isolated the integration, rotated credentials, and avoided any data exposure.

90 min
Alert time
11d → 0
Exposure window
₹0
Breach cost
FINTECH

RBI Outsourcing Guidelines

CHALLENGE

An NBFC needed to demonstrate continuous vendor risk monitoring for RBI's outsourcing guidelines but had no tooling — relying on spreadsheets and annual reviews.

OUTCOME

Gordon provided continuous monitoring with audit-ready logs, automated RBI-format reports, and a real-time dashboard the RBI examiner could access directly during the inspection.

Pass
RBI inspection
0
Audit findings
Real-time
Monitoring
Pricing

Third Party Risk is included in every plan.

Choose the plan that fits your team. Third Party Risk features are highlighted below — scroll down to see the full platform included in every plan.

Monthly
Annual Save vs monthly
Free
$0
15-day trial
 
Get Started
Enterprise
$79,000
/yr
Save vs monthly
Start Free Trial
Custom
Custom
Flexible terms
 
Talk to Sales
Included Not available Text = Usage limit
Features Free Startup Enterprise Custom
Overview(3 features)
Gordon AI Credits (monthly)50 credits500 credits2,500 creditsCustom allocation
Dashboard
Account (User) Limit1 accountUp to 5Up to 20Unlimited
Assess(7 features)
Security Checklist (60-point)Strong & Standard onlyDynamic + AnalyticsDynamic Checklist
VAPT (Vulnerability Assessment)5 API + 10 Dynamic PagesCustom
Third Party Risk3 vendorsUnlimited
Financial Impact — Risk Quantification
Financial Impact — Security ROI
Security Awareness (Phishing Sim + Training)5 Campaigns10 Campaigns
Cyber ForceOn DemandOn Demand
All other platform modules included
Identify(8 features)Other modules
Monitored Domains1520Unlimited
Monitored IPs550500Unlimited
Monitored Web Apps1520Unlimited
Tech & Services
Phishing Risk (Lookalike Domain + Email Security)
Code Workspace (GitHub, GitLab, Bitbucket)2 WorkspacesCustom
Cloud Security ComplianceSingle Cloud (3 instances)Multi Cloud (10+)
Workforce Risk Monitoring
Monitor (SOC & Threat)(10 features)Other modules
SOC Overview5 SOC Reports
Alert Triage5,000 alerts/moUnlimited
Investigation50 investigationsUnlimited
Threat Hunting1 exerciseCustomCustom
Auto Response
Risk Monitoring5 Category dashboards
Threat Intelligence (Threats, IOCs, Campaigns)10 threats, 5 IOCs, 2 campaignsUnlimitedCustom
Alert Center
Brand Intelligence (Monitoring + Takedown)50 notifications1 Company monitoringFull + TakedownFull + Custom feeds
Dark Web MonitoringCredential & Org LeaksIndustry + APT + Recent leaks
Risk Transfer(2 features)Other modules
Cyber Insurance
Incident Hotline (24/7)
Compliance (GRC)(2 features)Other modules
GRC Module1 Policy creation1 framework3 frameworksAll + Custom
Unlimited Policy Generation
Extras & Integrations(3 features)Other modules
Integrations3 active15 activeAll 26+ & Custom API
Marketplace
Credit Add-on Packs
Support & SLA(4 features)Other modules
Support ChannelDocs onlyEmail (48h SLA)Hotline + CSM (8h SLA)24/7 Engineer (1h SLA)
Dedicated Security Engineer
White-label / MSSP
API Access

All plans include a 15-day free trial — no credit card required.

FAQ

Common questions
answered honestly.

Questionnaires are point-in-time, self-reported, and only as accurate as what vendors choose to disclose. Gordon monitors vendors externally and continuously — checking their actual attack surface, breach history, and dark web exposure without relying on vendor self-assessment. Questionnaires are still useful for contractual purposes; Gordon makes them faster and augments them with objective data.
No. Gordon's external monitoring requires zero vendor participation — we assess vendors from the outside using publicly available signals, the same way an attacker would. This means you get immediate coverage without waiting for vendor cooperation. For questionnaire workflows, vendors receive an email link and can respond through a simple web portal.
Gordon generates compliance reports for RBI IT Framework (outsourcing guidelines), SEBI CSCRF, IRDAI cyber security guidelines, DPDP Act (data processor requirements), ISO 27001 Annex A.15, and SOC 2 vendor management requirements. Reports are pre-formatted for each framework and include evidence packages for auditors.
Fourth-party risk refers to the vendors of your vendors — the subprocessors and sub-contractors that your direct suppliers rely on. The SolarWinds and MOVEit breaches were fourth-party risks: attackers compromised a software supplier's supplier to reach thousands of organisations. Gordon maps these dependencies so you understand your true supply chain exposure.
Upload a CSV with vendor names and domains and Gordon scores all of them within 2 hours. For 500 vendors, the initial scoring is complete within 4 hours. You can also connect your procurement system (SAP Ariba, Coupa, Oracle) for automatic vendor discovery and continuous sync.
Yes. Gordon generates vendor-facing reports that show the specific issues identified and remediation guidance. You can share these directly with vendors to accelerate their remediation — and track their progress in the Gordon console. This collaborative approach typically reduces vendor remediation time by 60% compared to traditional questionnaire-only workflows.
Get Started Today

Your vendors are being
monitored right now.

The question is whether it's Gordon watching over them — or an attacker already inside. Start monitoring your vendors today.

Monitor Your Vendors Book a Demo