Measure Vendor Risk in Minutes
AI-powered vendor risk assessment that gathers OSINT signals, generates multi-factor risk scores, and provides actionable compliance intelligence.
How It Works
From company name to comprehensive risk intelligence in under 2 minutes
Enter Company Details
Input the company name and domain you want to assess. Our system begins comprehensive signal collection.
AI Signal Analysis
Our AI processes 150+ OSINT sources including CVE databases, dark web monitoring, and reputation feeds.
Multi-Factor Scoring
Receive detailed risk scores across 6 categories with full evidence and justification for each finding.
Actionable Intelligence
Get prioritized remediation steps mapped to SOC 2, NIST, and ISO 27001 compliance frameworks.
Signals We Collect
Comprehensive OSINT collection across 6 intelligence categories
Firmographic Data
Company size, funding, location, industry classification, and organizational structure.
Technology Footprint
Tech stack analysis, integration surface, API exposure, and infrastructure assessment.
Vulnerability Intel
CVE database correlation, known exploits, patch status, and security advisories.
Third-Party Risk
Vendor dependencies, supply chain exposure, integration complexity analysis.
Dark Web Monitoring
Credential leaks, breach mentions, forum chatter, and threat actor activity.
Reputation & Sentiment
News analysis, social sentiment, customer reviews, and industry perception.
Example Scorecard
Real vendor risk assessment for Mycroft (mycroft.io) - AI Security Platform
Mycroft (mycroft.io)
AI Security & Compliance SaaS
Founded 2024 - Toronto, Canada
Score Breakdown
Key Findings
- - 150-250+ integrations create significant vendor graph exposure
- - No public CVEs specific to the platform identified
- - Strong investor backing (Luge, Brightspark, Graphite)
- - Early-stage with limited operational track record
Compliance Intelligence
Map risk findings directly to major compliance frameworks
Supported Frameworks
SOC 2 Type II
Trust Service Criteria mapping for Security, Availability, Confidentiality, Privacy, and Processing Integrity.
NIST CSF
Cybersecurity Framework alignment across Identify, Protect, Detect, Respond, and Recover functions.
ISO 27001
Information Security Management System controls mapped to Annex A requirements.
SOC 2 Trust Categories
Simple, Transparent Pricing
Start with a free scan, upgrade as you grow
Free Scan
Try WISR with a single company assessment
- 1 company scan
- Basic risk scorecard
- Signal overview
- PDF export
Professional
For security teams managing vendor risk
- 10 scans per month
- Full risk intelligence
- Historical trending
- Compliance mapping
- API access
- Priority support
Enterprise
Unlimited assessments for large organizations
- Unlimited scans
- White-label reports
- Custom integrations
- Dedicated CSM
- SLA guarantees
- On-premise option