Included in All Plans

Security Practices

Built-in security tools that go beyond checkbox compliance. Run phishing tests, assess vendors, track vulnerabilities, and manage incidents.

Security Tools Built for Compliance

Every tool maps directly to a NY DFS requirement, so you are building real security while satisfying your regulator.

Phishing Simulation

Send realistic phishing campaigns. Track clicks, reports, and training outcomes. Satisfies Section 500.14.

Vendor Risk Assessments

Assess third-party vendors with questionnaires. Track vendor security posture. Satisfies Section 500.11.

Vulnerability Tracking

Track vulnerability remediation across your environment. Prioritize by severity. Satisfies Section 500.05.

Risk Register

Identify, score, and track risks to your information systems. Satisfies Section 500.09.

Incident Tracking

Log and track security incidents. 72-hour DFS notification deadline tracking. Satisfies Section 500.16/500.17.

Security Training

Interactive training modules for security awareness. Course library with completion tracking.

Mapped to NY DFS Requirements

Each security practice tool satisfies specific sections of 23 NYCRR 500.

500.05

Penetration Testing & Vulnerability Assessment

Covered by: Vulnerability Tracking

500.09

Risk Assessment

Covered by: Risk Register

500.11

Third-Party Service Provider Security

Covered by: Vendor Risk Assessments

500.14

Training & Monitoring

Covered by: Phishing Simulation & Security Training

500.16

Incident Response Plan

Covered by: Incident Tracking

500.17

Notices to Superintendent

Covered by: Incident Tracking (72-hour deadline)

Beyond Checkbox Compliance

These are not just compliance checkboxes. Each tool helps you build real security practices that protect your business and satisfy auditors.

  • Phishing campaigns that actually train employees
  • Vendor assessments that identify real supply chain risks
  • Vulnerability tracking that drives remediation
  • Incident workflows with built-in 72-hour DFS notification tracking
  • Risk scoring that prioritizes what matters most

What's Included

Phishing Simulation

Send realistic phishing campaigns. Track clicks, reports, and training outcomes. Satisfies Section 500.14.

Vendor Risk Assessments

Assess third-party vendors with questionnaires. Track vendor security posture. Satisfies Section 500.11.

Vulnerability Tracking

Track vulnerability remediation across your environment. Prioritize by severity. Satisfies Section 500.05.

Risk Register

Identify, score, and track risks to your information systems. Satisfies Section 500.09.

Incident Tracking

Log and track security incidents. 72-hour DFS notification deadline tracking. Satisfies Section 500.16/500.17.

Security Training

Interactive training modules for security awareness. Course library with completion tracking.

Build Real Security Practices Today

Start your free trial and begin testing, assessing, and tracking security across your organization.