Search

Technical Cyber Security Rating

The Most Comprehensive and Accurate Technical Intelligence.

The Black Kite Technical Rating provides easy-to-understand letter grades and defensible data details behind 20 risk categories. The non-intrusive report passively evaluates third parties, and does not touch an organization’s systems or network assets.

Free Cyber Rating

Easy-to-Understand Letter GradesCalculated by Defensible Data

Black Kite follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner, converting highly technical terms into simple letter grades.

C+
1X A
3X B
5X C
7X D
8X F
8X more likely to be breached
technical score categories

Vulnerability Prioritization

Black Kite provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.

Powerful Performance behind 20 Categories

The total score is a weighted average of 20 category components, providing unmatched breadth and insight into detected vulnerabilities.

Tap on items to learn more.

With Financial Impact Correlations

Now That I Have the Data – What Do I Do With It? Black Kite’s Strategy Report

black kite strategy report simplified

Black Kite’s Strategy Report shares feedback to help executives to understand their cyber risk posture and scale return on cybersecurity investments. The report provides simple steps to help remediate issues and mitigate cyber risks with suppliers and partners. Helpful One-Pager →

Benefits

Receive simple, outlined steps

Multiple formats available for download (PDF, Excel, etc.)

Prioritize tasks based on critically

Trusted by

BCBS
PNC Bank Logo
fannie mae
Markel
Aqua logo
lpl financial

RECENT UPDATES

FOCUS FRIDAY: TPRM INSIGHTS INTO THE PAN-OS CLEARTEXT VULNERABILITY & A SNEAK PEEK INTO WHAT’S NEXT
FOCUS FRIDAY: TPRM INSIGHTS INTO THE PAN-OS CLEARTEXT VULNERABILITY & A SNEAK PEEK INTO WHAT’S NEXT
Written By: Ferdi Gül & Ferhat Dikbiyik Welcome to this week’s Focus Friday blog, where we continue to explore…
Read More
Don’t Wait for Ransomware: RiskBusters Shows How to See It Coming
Don’t Wait for Ransomware: RiskBusters Shows How to See It Coming
Written by: Bob Maley Ransomware is a significant concern for many businesses, and understandably so. Black Kite’s…
Read More
Stuck on Defense: Don’t Use a Security Rating Score Alone to Manage Vendor Risk
Stuck on Defense: Don’t Use a Security Rating Score Alone to Manage Vendor Risk
Written by: Bob Maley If it rained yesterday, should you wear a raincoat today? It’s not a simple answer. You need…
Read More
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™
Written By: Ferdi GülContributor: Ferhat Dikbiyik Welcome to this week’s Focus Friday, where we dive into the late…
Read More
Our RiskBusters Bust the TPRM Myth that You Can’t See Nth-Party Risks
Our RiskBusters Bust the TPRM Myth that You Can’t See Nth-Party Risks
Written by: Jeffrey Wheatman In the world of Third-Party Risk Management (TPRM), one of the most stubborn and pers…
Read More

Ready to get started?