Free tools (Get started): inventory assets, data, and vendors—export for Pro tools or the platform. Pro tools (Build & respond): evidence tracker, incident and breach response. Use any tool in-browser; no fixed order.
Sector exposure brief, organization posture snapshot, and vendor threat radar. Snapshots and pre-onboarding only (not the full workflow). All in-browser.
Identify assets and risks to protect; centralized inventory with CISA/NIST alignment. Export structured data for use in paid tools.
Identify data to protect; classification, lifecycle, and privacy compliance. Export for breach response and evidence.
Identify vendors and third parties to protect; supply chain and vendor risk. Export for evidence and response tools.
Document how you protect: evidence and controls linked to CISA CPG, NIST. Use standalone or import from free tools.
Protect when it matters: playbooks for ransomware, malware, phishing, breaches. Use standalone or with free-tool context.
Protect and respond: breach plans, GDPR/CCPA/HIPAA, cost estimation. Use standalone or import from Data Inventory and Vendor Register.
Industry-specific data privacy, supply chain risks, applicable requirements, roles and responsibilities, and ERMITS solutions by sector.