Skip links

Supply chain analysis

Threat Based Cybersecurity — For the Ecosystem

An organization’s supply chain is only as strong as its weakest link. When it comes to cyber risk, weak links are getting difficult to uncover—especially if your company depends heavily on service providers and suppliers. Often, 3rd and 4th party providers will negatively contribute to your overall cyber risk. For the first time, Lighthouse’s Port Authority module enables national level organizations to continuously and proactively validate the security posture of their entire ecosystem. Port Authority allows commercial and government organizations to aggregate and analyze Lighthouse data across their area of interest (e.g. Defense Industrial Base, Supply Chain, Geographic Areas, etc.).

Threat Based Cybersecurity — Focused


Situational awareness

Benchmark security readiness against the industry standard. Users can evaluate country and industry cybersecurity risk exposure; enabling departments and agencies agencies to self-assess their cybersecurity readiness.
Find opportunities for improvement by continuously validating the actual security readiness of critical infrastructure companies. New tactics can be tested and findings can be fixed and validated before a breach occurs. Users can be alerted when the cyber risk posture of these companies change with custom thresholds.

Find and understand readiness gaps across the organization and around the world.

Port Authority aggregates and analyzes Lighthouse information from various parts of the organization.


Compare results across supply chain

Bringing organization reporting data together lets clients analyze their readiness in a variety of ways: plot trends over time, identify hot spots, investigate new adversary tactics, highlight best practices, identify currency, and so much more.

Port Authority enables organizations to:


Dramatically increase your situational awareness of cybersecurity readiness throughout your ecosystem


Identify hot-spots in need of immediate attention Track currency & completeness of tests


Conduct dynamic analysis of new threat vectors or deep dive on specific threat vectors


Assess industry & verticals readiness metrics & trends


Execute robust what-if scenarios