Vendor monitoring that doesn't depend on vendor self-reporting.

Annual vendor questionnaires capture posture at one moment, filtered through the vendor's own self-reporting. Continuous Monitoring runs external scanning on every approved vendor in your portfolio (the same seven-layer scanning Deepinfo applies to your own surface) and surfaces what's actually exposed regardless of what the questionnaire says.

WHAT THIS DOES

Always-on external scanning of every vendor in scope.

Each vendor in your monitored portfolio gets continuous scanning across the same seven data layers EASM uses internally: Whois, IP-Whois, DNS, SSL, port scan, HTTP, web data. The vendor doesn't have to participate; everything visible from the public internet is observable, and that's what an attacker would see too.

Findings on vendor infrastructure get the same severity, evidence, and lifecycle treatment as your own findings. The same nine-state issue lifecycle applies. The same compliance mapping applies. The same alerting routes apply. Vendors don't sit in a separate, lighter monitoring tier; they get the full surface treatment your own assets get.

HOW IT WORKS

Three monitoring properties, same as your own surface.

Seven-layer scanning per vendor. Drift detection on vendor infrastructure. Same scoring, same lifecycle, same alerts as your internal assets.

Seven-layer scanning per vendor.

Whois, IP-Whois, DNS, SSL, port scan, HTTP, web data. Continuously, with full historical state preserved per layer. The vendor's external surface is treated as a first-class monitored portfolio.

Drift detection on vendor infrastructure.

Vendor SSL rotated. Vendor DNS changed. Vendor opened a new port. Vendor deployed a new web technology. Each detection routes the same way internal-asset detections do, with vendor identification carried through.

Same scoring, same lifecycle, same alerts.

Vendor findings flow into the same scoring model, the same nine-state issue lifecycle, and the same alerting infrastructure as internal findings. Your team sees vendor risk in the same dashboards, in the same reports, with the same mental model.

WHAT IT SURFACES

Examples of vendor findings continuous monitoring catches.

Expired or weak SSL

Vendor-controlled certificates that are expired, near expiry, or use weak ciphers.

Misconfigured DNS

Vendor properties with open zones, unused MX records, or DNS hygiene issues.

Open ports

Ports on vendor infrastructure that shouldn't be public, surfaced via port scanning.

CVEs detected

Vulnerabilities surfaced via web technology fingerprinting on vendor properties.

Vendor-side certificate rotations

Legitimate operational signal that affects integration health and may need coordination.

Vendor security incidents

Posture changes correlated through observed shifts in their external surface.

Asset additions

New infrastructure as the vendor expands their footprint, automatically added to the monitored scope.

PART OF TPRM

Continuous Monitoring is the engine of TPRM.

Smart Third-Party Discovery surfaces vendors. Continuous Monitoring scans them. Comprehensive Risk Assessments classify findings into severity and risk categories. Automated Risk Scoring rolls everything into per-vendor and portfolio-level scores. Compliance Tracking maps findings to your compliance framework. One workflow.

← Back to TPRM

“Annual vendor reviews missed every drift event between cycles. Continuous monitoring catches certificate expirations, deprecated configurations, and exposed services on day one, regardless of when the next questionnaire is due.”

— VP of Third-Party Risk, Banking Group
SEE VENDOR EXPOSURE

See your vendor portfolio's actual posture.

Book a demo. We'll run discovery + monitoring against your top vendors and walk through what surfaces.

Request a demo