Tech Marketplace:
Discounts and Special Offers
Industry-leading service and product providers committed to the RH-ISAC community
Free 1-Year Subscription
RH-ISAC members get a complimentary 12-month membership for one executive for the 360 Privacy flagship 360 Enterprise tiered offering. This includes the removal of Personally Identifiable Information from 400+ public data broker websites, Monthly Deletion Reporting, and Optional Decoy data deployment.
To redeem, email [email protected] with the subject line “RH-ISAC Exclusive Offer: 360 Privacy”
360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes, and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.
10% Off Penetration Testing & Complimentary Strategic Workshop
Secure your systems and fortify your defenses with AccessIT Group‘s expert-led penetration tests, meticulously tailored to meet the unique needs of your industry. By partnering with AccessIT Group, you’ll gain invaluable insights into potential vulnerabilities and strengthen your security posture for the year ahead. Additionally, sign up for free strategic workshop, tailored to navigate the complexities of the modern information age.
Penetration Testing
Why Choose Us?
- Proven Expertise: With years of experience and a track record of success, we’re your trusted cybersecurity partner.
- Comprehensive Solutions: Our work ensures thorough testing across all critical areas of your infrastructure including but not limited to: External testing, Internal testing, Cloud testing, Application testing, phishing & more.
- Customer Satisfaction: Join countless satisfied clients who have enhanced their security with our services.
Don’t let cyberthreats compromise your operations. Take advantage of this special offer and invest in your organization’s security today.
**The 10% discount applies to the purchase order price of your latest penetration test, given that it’s dated within the last 24 months and does not already include the promotional rate. Offer valid for Retail & Hospitality ISAC members only.
Strategic Workshop
Transform your organization’s approach to cybersecurity with a free 2-3 hour session from our strategic workshop series, tailored to navigate the complexities of the modern information age. Our series is designed to equip your team with the insights and tools needed to fortify your cybersecurity posture in a rapidly evolving landscape. Each workshop is crafted to help your team address key areas of cybersecurity, ensuring your organization stays ahead of threats and compliant with industry standards.
As your strategic partner, we are committed to evolving with you, continuously updating our offerings to include the most relevant and impactful topics. Join us to proactively enhance your cybersecurity strategy and turn potential vulnerabilities into strengths.
Potential Workshop Topics:
- Technology Rationalization: Streamlining your cybersecurity tech stack for efficiency and effectiveness.
- Threat Detection & Response: Building and enhancing capabilities to identify, assess, and mitigate cyber threats.
- PCI Readiness and PCI 4.0: Preparing for and adapting to the latest standards in payment card industry security.
- Data Protection: Implementing robust strategies to safeguard critical data from breaches and leaks.
- Cloud Security Architecture: Designing and securing cloud environments to protect assets in a cloud-based infrastructure.
Embark on a journey to redefine your cybersecurity strategy, with workshops and recommendations that provide the knowledge and action plans to secure your digital future.
Free Online Brand Protection Monitoring
RH-ISAC members are eligible for free online brand protection monitoring from Allure Security to get alerted to websites impersonating your brand amongst more than 100 million sites examined daily.
- Get alerted to websites impersonating your brand amongst more than 100 million sites examined daily
- View potentially malicious URLs, domains, and indicators that match your brand
- Sample the value of Allure Security online brand protection with a free account
10% Off the Armis Centrix Platform
As part of their commitment to the RH-ISAC community, Armis is offering an exclusive 10% off of the Armis Centrix Platform for members. Armis Centrix™ is the cyber exposure management platform that protects the entire attack surface and manages an organization’s cyber risk exposure in real time.
To redeem, email [email protected] with the subject line “10% Discount off the Armis Centrix Platform for RH-ISAC Members”
A Comprehensive, Modular Approach
- Armis Centrix™ for Asset Management and Security: Complete inventory of all asset types to see and secure your attack surface
- Armis Centrix™ for OT/ IoT Security: See and secure OT networks and physical assets, ensure uptime, and build an effective and comprehensive security strategy
- Armis Centrix™ for Vulnerability Prioritization and Remediation: See, consolidate, prioritize, and remediate all vulnerabilities
3 Months Free with a 12-Month Enterprise Grade Bundle
BlackCloak protects corporate executives and high-profile individuals from cybersecurity, privacy, financial, and other reputational risks. As an RH-ISAC member, if you sign up for any 12-month enterprise grade bundle, you will receive an additional 3 months at no additional charge.
To redeem, email [email protected].
The BlackCloak Concierge Cybersecurity & Privacy™ Platform is a holistic solution including mobile and desktop apps as well as concierge support. Executives get peace of mind knowing their family, reputation, and finances are secured. Companies rest assured that their brand, intellectual property, data, and finances are protected against threats coming through executives without having to invade their personal lives.
Free Trial: One Platform to Secure All GenAI
Sign up for a free trial to experience how CalypsoAI platform maximizes your AI investments while ensuring security, compliance, and performance. This offer includes a guided walk-through with one of our security consultants and a complimentary security audit to identify potential vulnerabilities to emerging threats.
This RH-ISAC-exclusive offer starts with a tailored walk-through of the CalypsoAI platform and complimentary security audit to help you successfully test-drive our solution. This enhanced experience will get you the path to ensuring your AI security strategy is as advanced as the threats you face.
10% Off Pre-Hardened Virtual Machine Images for Windows, Mac, and Linux Operating Systems
Secure your cloud environment with CIS Hardened Images® for Windows, Mac, and Linux operating systems from the Center for Internet Security® (CIS®). These cost-effective virtual machine images provide you with a secure, on-demand, and scalable computing environment and can help you meet your industry compliance requirements. CIS is partnering with AccessIT and RH-ISAC to help members improve their security posture with CIS Hardened images for AWS, Microsoft Azure, Google Cloud, and Oracle Cloud environments.
CIS Hardened Images® are pre-hardened virtual machine (VM) images for Windows, Mac, and Linux operating systems (OSes). They offer built-in secure configuration and compliance according to the recommendations of the globally recognized CIS Benchmarks™, which are the only consensus-based, vendor-agnostic, best practice secure configuration guides both developed and accepted by government, business, industry, and academia. CIS Hardened images are available for over 50 OS versions on major cloud service platforms like AWS, Microsoft Azure, Google Cloud, and Oracle Cloud.
These cost-effective VM images provide you with a secure, on-demand, and scalable computing environment pre-configured to the security guidance of the CIS Benchmarks and that complements your existing cybersecurity infrastructure. They can help you save time and effort on avoiding misconfigurations and staying secure against malware, denial of service, and other cyber threats. CIS Hardened Images can also help you meet your compliance requirements to industry frameworks, including PCI DSS, NIST CSF, and FFIEC. Each CIS Hardened Image provides evidence of compliance and is regularly updated by the Center for Internet Security® (CIS®) to address emerging cyber threats.
Free Configuration Security Assessment
Sign up for a complimentary configuration risk assessment and free GYTPOL trial (extending to 50 devices for 30 days). The assessment includes an incident report detailing the top threats encountered and an interactive review of results. Say goodbye to insecure configurations and hello to push-button remediations!
See full details at https://go.gytpol.com/resources/free-configuration-security-assessment
Free 30-day Trial to Monitor and Assess Bot Traffic
Kasada offers a free instant Bot Threat Report for the site of your choosing. Additionally, for qualified RH-ISAC members, Kasada offers an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic.
The Bot Threat Report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.
Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.
Free Security Posture Analysis & Proof-of-Concept Trial
RH-ISAC members can get a complimentary Security Posture Report from Red Sift that analyzes attack surface management, certificate monitoring, domain impersonation, and email security. After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions.
Red Sift Security Posture Report covers:
- Attack Surface Management – continuous and automatic identification of configuration issues, including deep configuration and prioritization data to speed remediation
- Certificate monitoring – including issuance and expiration, configuration information to identify current certificates and causes of invalidation. We also find and monitor 3rd party certificates.
- Domain impersonation – Insight into malicious activity for key domains, words, and logos.
- Email security – Understand your email domain security setup and any vulnerabilities to exact domain impersonation which is used in phishing attacks.
After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions. An active ISAC membership and commitment to a 45-minute meeting to review the report with the Red Sift team. A free POC requires the member’s involvement to build a requirements plan covering objectives, participants, and timelines before beginning the POC.
Free 30-day Trial for the RiskRecon Portal
Get free access to the RiskRecon portal and see the security ratings of up to 50 vendors of your choice. You’ll receive access security ratings for up to 50 vendors in your ecosystem, a RiskRecon report of your own organization, risk prioritized security findings via RiskRecon’s unique Risk Priority Matrix, and a quick start guide to assist with your on-boarding and full access to our expert Solutions Consulting team.
What can you expect from your 30-day trial?
- Security ratings for 50 vendors in your ecosystem
- A RiskRecon report of your own organization
- Risk-prioritized security findings via RiskRecon’s unique Risk Priority Matrix
- A quick start guide to assist with your onboarding and full access to our expert Solutions Consulting team
Free 60-Day Enterprise License
Get a complimentary SecurityScorecard Enterprise License that enables you to monitor your own organization as well as up to 30 vendors, suppliers, or competitors (the choice is yours) for 60 days.
SecurityScorecard scores and monitors over 12 million companies using an A to F grade scale that correlates with breach risk (F Companies are 7.7X more likely to be breached than A Companies). The platform can score and monitor the external cybersecurity posture of any organization using non-intrusive methods and show it how to improve via actionable detail.
You and your team can leverage SecurityScorecard for a variety of use-cases that include, vendor risk management, enterprise monitoring, board reporting, M&A and regulatory compliance.
Free Access to the Stairwell Platform
The Stairwell ISAC Program is a free initiative that fosters collaborative threat intelligence sharing among ISAC members. Participants gain access to a private malware repository and analysis tool, shared threat detection resources, and contributions from ISAC threat teams, enabling collective knowledge sharing and stronger community defenses.
The Stairwell ISAC Program is a free initiative to support collaborative threat intelligence sharing among ISAC members. As a member of the Stairwell ISAC Program, you get access to:
- Private malware repository: Securely store and analyze malware to bolster your organization’s threat detection and response capabilities.
- Collaborative threat sharing: A dedicated space for ISAC members to privately exchange malware, YARA rules, and threat reports, enhancing everyone’s detection capabilities.
- Shared resources: Access a community-driven repository of malware samples, YARA rules, and threat reports to integrate into your own systems and processes.
- Knowledge sharing & collaboration: Work alongside peers of varying expertise levels, contributing to and benefiting from shared knowledge that strengthens the entire community’s security posture.
- Integrate into your workflow: Use webhooks to integrate Stairwell with your SIEM and SOAR tools, enabling you to utilize Stairwell intelligence within your existing security stack.
- ISAC threat team contributions: Stay informed with industry-specific intelligence provided by ISAC threat teams, ensuring you’re equipped with the latest insights on emerging threats.
Free threatER for 1 Year
Block All Known Threats Across Your Network
Free 2-Year Look Back Analysis to Identify Past Fraud and Human Errors
TrustMi‘s core AI engine will build a strong baseline based on the information about your vendors and payments from the last 2 years. During the baseline process, an analysis will be performed to detect fraud and abnormal activities without disrupting your business workflow and with minimal to no involvement from your organization.
Global visibility
- Across-the-board payment-related monitored mailboxes
- Transactions value
- Global list of suppliers
- Global view of transaction approval status
Trust
- Transactions validity verdict
- Vendor validity verdict
- Financial process validation
Value
- Risky change of bank accounts
- Mitigation of past fraud attempts
- Double invoice payment
- Dollar amount saved in fraud
Complimentary Advanced Continual Threat Hunt
Trustwave is a cyber-only focused company that hunts threats and stops threats all day every day. Trustwave can detect what others can’t enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. RH-ISAC members can register for one complimentary Advanced Continual Threat Hunt.
Number of hunts are limited and available on a first come, first served basis. Only one hunt per customer request. Customer must have an EDR supported by Trustwave.
Free 30-Day Trial
As part of our commitment to the RH-ISAC community, Xeol are offering a 30-day trial. Sign up with your corporate email, and the company will grant you access to Xeol. See your full EOL posture in 5 minutes.
Xeol closes the end-of-life gap in your vulnerability management program:
- Continuously monitor for EOL from commercial software to open source projects.
- Proactively manage the riskiest EOL issues because their vulnerabilities cannot be patched.
- Protect your PCI environments with security policies that gate risky EOL dependencies.