Access Intelligence Trust Centre

Security & Compliance | ISO 27001 | Third-Party Risk Assessments | GDPR | Sub-Processors


Third-Party Risk Assessments

Third-party risk management (TPRM) is a form of risk management that focuses on identifying and reducing risks relating to the use of third parties (sometimes referred to as vendors, suppliers, partners, contractors, or service providers).  3rd Party Risk Assessments are conducted with potential new suppliers to give organisations an understanding of the third parties they use, how they use them, and what safeguards their third parties have in place. 

As a software provider to large enterprises and emergency services, Vuelio and Pulsar are regularly reviewed by prospective clients. Security questionnaires vary from organisation to organisation, however, there are similarities in the questioning. We have also noted that there has been an increase in TPRM software being used to automate an organisations supplier risk management reviews.

As a potential supplier, we aim to make this process as efficient as possible and have setup profiles with several supplier risk assessment vendors. Users of these tools can proactively import our ready made risk profiles into their accounts for evaluation.

Remember, all InfoSec policies which supplement these risk assessments can be found on our ISO 27001 page.

Vuelio Risk Assessments

Vendor URL Our Profile
One Trust Vendorpedia https://www.onetrust.com/ Vuelio’s Trust Profile
Panorays https://panorays.com/ Vuelio’s Security Passport
SIG https://sharedassessments.org/ Contact us
Prevalent https://www.prevalent.net/ Contact us

Pulsar Risk Assessments

Vendor URL Our Profile
Risk Ledger https://riskledger.com/ Risk Ledger Profile
One Trust Vendorpedia https://www.onetrust.com/ Pulsar’s Trust Profile
https://www.cybergrx.com/ Contact us
CyberVardis https://cybervadis.com/ Contact us

White paper

If you would like to review Vuelio or Pulsar but don’t use one of the vendors above, we have produced a white paper to provide you with answers to common questions.

Please use this resource, along with the other information within this Trust Centre, to start completing your questionnaire. Our team is available to collaborate on specific questions.

File Access Intelligence Security and Compliance Overview