FortMesa for service providers
Tailored Profiles
Establish security profiles that map to industry cyber standards
Scheduled Hardening
Choose a schedule to orchestrate system hardening over time
Transparent Reporting
Gain customer trust with a cyber transparency dashboard that generates always up-to-date documentation
Your customers want to know how much security they have, how much they need, and how you’re going to get them there over time.
Use your team to achieve industry compliance goals with security planning on autopilot.Â
Harden Customers From Cyberattack – And Prove It.
- Establish security profiles that map to industry cyber standards
- Choose a schedule to orchestrate system hardening over time
- Gain customer trust with a cyber transparency dashboard that generates always up-to-date documentation
- Critical Infrastructure
- Defense
- Financial Services
- Healthcare
- Logistics
- Manufacturing
- Public Sector
- Retail / E-Commerce
- Software / SaaS
- Technology
- CIS Controls
- CMMC
- FedRAMP
- HIPAA
- NIST CSF
- NIST SP 800-53
- SOC 2
- More…
We also support regional standards like UK GCHQ Cybersecurity Essentials and South Africa POPIA.
Endpoint protection products detect attacks after they reach your systems. The only way to prevent an attack is to eliminate cyber vulnerabilities.
Discover cyber vulnerabilities, then use business knowledge to assess risk and recruit stakeholders to manage it.
- Scan Windows, Mac & Linux every day
- Leverage the world’s largest built-in database of over 160,000 vulnerabilities
- Remediate vulnerabilities according to business risk acceptance
Security researchers discovered and published 50 new ways to attack systems every day in 2021.
Service Provider Editions
Pathfinder NFR
For service provider partners looking to build cybersecurity resilience and compliance to excel in service delivery.
 Multi-Tenant Edition
For service provider partners looking to guide clients on cyber compliance, implement security, and prove its effectiveness.
Continurisk GRC
Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
---|---|---|---|
Essential tools to show clients what security they have for service providers looking to convert clients to invest in the cybersecurity they need | Comprehensive cyber compliance tools for service providers building advanced tiers of cybersecurity that comply with industry standards | Our most powerful cyber compliance workflows for service providers that need to engineer and prove cyber compliance for third parties and regulators | Audit-grade compliance delivery and assessor workflows for service providers preparing for or administering third party certifications |
Free for select partners | Monthly per organization | Monthly per organization | Annual per organization |
Tools included •CIS Controls •Gap Analysis •Custom Profiles | Tools included •Industry Compliance Standard Controls •Gap Analysis •Custom Profiles •Implementation Management •Service Desk •Implementation Reports | Tools included •Everything in Professional •Policy Management •Compliance Reports •CSV Exports •Egress APIs •FortMesa Trustmark | Tools included •Everything in Advanced •Assessment Management |
Features | Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
Vanity hosting URL | vCISO.app | vCISO.app | vCISO.app | vCISO.app |
Google Workspace IdP Federation | check_circle | check_circle | check_circle | check_circle |
Multifactor authentication | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator |
User identity domain enforcement | - | - | check_circle | check_circle |
Notifications | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack |
Custom provider security plan profiles | Up to 2 active | Up to 2 active | Unlimited | Unlimited |
CIS Controls Framework | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 |
Industry Control Frameworks | - | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA |
Rapid gap analysis | check_circle | check_circle | check_circle | check_circle |
Riskchain VM
Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
---|---|---|---|
Essential tools to demonstrate vulnerability detections | Comprehensive vulnerability management tooling for service providers looking to target and deliver risk-based vulnerability remediation SLAs | Our most powerful vulnerability management workflows for service providers that need risk accept and advanced data analytics capabilities | Audit-grade vulnerability workflows for unlimited devices for service providers looking to provide vulnerability management to clients of any size |
Free for select partners | Monthly per device | Monthly per device | Annual per organization |
Tools included •Asset Inventory •Vulnerability Inventory •Risk-based Vuln Prioritization | Tools included •Asset Management •Vulnerability Management •Service Desk •PDF Reports | Tools included •Everything in Professional •Risk Accept •CSV Exports •Egress APIs | Tools included •Everything in Advanced •Unlimited Devices |
Features | Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
End client customers | check_circle | check_circle | check_circle | check_circle |
Internal use | check_circle | check_circle | check_circle | check_circle |
Assessment quickstart | check_circle | check_circle | check_circle | check_circle |
Service provider in-app branding | Custom logo | Custom logo | Custom logo | Custom logo |
Service provider PDF report branding | Custom logo | Custom logo | Custom logo | Custom logo |
Vanity hosting URL | vCISO.app | vCISO.app | vCISO.app | vCISO.app |
Google Workspace IdP Federation | check_circle | check_circle | check_circle | check_circle |
Multifactor authentication | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator |
User identity domain enforcement | - | - | - | - |
Get a personalized demonstration from the channel success team and learn how FortMesa can enable new opportunities to protect your customers from cyber risks.