Skip to content
English - United Kingdom
  • There are no suggestions because the search field is empty.

Assessments

1. About


The Assessment section in the Settings menu is designed to configure the assessment process for connections and groups within the RiskXchange platform. This user manual guide will walk you through the various sub-subjects and settings available in this section.

 

2. Configuring Assessments

The users have the option to send assessments either manually or automatically. The automatic dispatch option allows users to set a schedule based on their requirements, ensuring a timely and consistent approach to compliance assessments. This feature reduces the chances of missing important deadlines.

 

3. Purpose of Assessments

The purpose of assessments in the RiskXchange platform is to provide organizations with a comprehensive view of their attack surface and evaluate their security posture. Assessments are crucial for proactively addressing cyber threats and safeguarding digital assets. RiskXchange offers continuous monitoring, data breach detection, and automated security assessments to empower businesses in managing cyber risks. Daily continuous risk scoring provides real-time updates on changes in a vendor's security posture, enabling organizations to take prompt proactive measures to counter emerging vulnerabilities.

 

4. Sorting and Information Display

In the Assessment section, assessments are sorted based on completion status (complete or incomplete). Each assessment entry includes information about the requester of the assessment, whether it is private, and a progress bar indicating the completion status. This arrangement provides a clear overview of ongoing and completed assessments. To view and manage assessments, follow these steps:

 

Step 1: Access the Assessment section in the app's left-side menu.

Step 2: Locate the list of assessments.

Step 3: Assessments will be displayed with relevant details such as requester, privacy status, and progress.

Step 4: Click on an assessment to view additional information or manage its settings.

 

By effectively configuring assessments, users can stay informed about changes in their organization's connections' security posture and take prompt action to mitigate any potential risks.

 

Note: The availability of certain features and options may vary depending on your user role within the app.