Member Login Become a Member
  • Who We Are
    • About RH-ISAC
    • Core Members
    • Associate Members
    • Leadership & Staff
    • Partners
    • Careers
  • What We Do
    • Sharing & Collaboration
    • Threat Intelligence
    • Working Groups
    • Career Growth
    • Benchmarking
    • Discounts & Special Offers
  • Join
    • Core Membership
    • Associate Membership
    • LinkSECURE
    • Join RH-ISAC
  • Events
    • Calendar
    • RSA Conference
    • Summit
    • Regional Workshops
    • CISO Events
    • Call for Presentations
    • Sponsor an Event
  • Publications
    • Blog
    • Reports & Documents
    • CISO Benchmark
  • Newsroom
    • Press Releases
    • Newsletter
    • Media Contact

Tech Marketplace:
Discounts and Special Offers

Industry-leading service and product providers committed to the RH-ISAC community

360 Privacy logo
Offer
Details
Offer

Complimentary 1-Year 360 Monitor Subscription

RH-ISAC members receive one complimentary 360 Monitor seat for 12 months, providing ongoing visibility and reduction of personal digital exposure. The service removes data from hundreds of data broker sites, monitors for re-exposure, and scans the deep and dark web—supported by a dedicated client experience team.

HOW TO REDEEM: Email [email protected] with the subject line: “RH-ISAC Exclusive Offer: 360 Privacy”

Details

Powered by the 360 Strata™ platform, 360 Privacy reduces digital exposure for executives and high-profile individuals by combining automated discovery, expert analyst remediation, and continuous monitoring across data brokers, social media, breach repositories, and dark web sources.

Access IT Group
Offer
Details
Offer

10% Off Penetration Testing & Complimentary Strategic Workshop

Secure your systems and fortify your defenses with AccessIT Group‘s expert-led penetration tests, meticulously tailored to meet the unique needs of your industry. By partnering with AccessIT Group, you’ll gain invaluable insights into potential vulnerabilities and strengthen your security posture for the year ahead. Additionally, sign up for free strategic workshop, tailored to navigate the complexities of the modern information age. 

Details

Penetration Testing

Why Choose Us?

  • Proven Expertise: With years of experience and a track record of success, we’re your trusted cybersecurity partner.
  • Comprehensive Solutions: Our work ensures thorough testing across all critical areas of your infrastructure including but not limited to: External testing, Internal testing, Cloud testing, Application testing, phishing & more.
  • Customer Satisfaction: Join countless satisfied clients who have enhanced their security with our services.

Don’t let cyberthreats compromise your operations. Take advantage of this special offer and invest in your organization’s security today.

**The 10% discount applies to the purchase order price of your latest penetration test, given that it’s dated within the last 24 months and does not already include the promotional rate. Offer valid for Retail & Hospitality ISAC members only.


 

Strategic Workshop

Transform your organization’s approach to cybersecurity with a free 2-3 hour session from our strategic workshop series, tailored to navigate the complexities of the modern information age. Our series is designed to equip your team with the insights and tools needed to fortify your cybersecurity posture in a rapidly evolving landscape. Each workshop is crafted to help your team address key areas of cybersecurity, ensuring your organization stays ahead of threats and compliant with industry standards. 

As your strategic partner, we are committed to evolving with you, continuously updating our offerings to include the most relevant and impactful topics. Join us to proactively enhance your cybersecurity strategy and turn potential vulnerabilities into strengths.

Potential Workshop Topics:

  • Technology Rationalization: Streamlining your cybersecurity tech stack for efficiency and effectiveness.
  • Threat Detection & Response: Building and enhancing capabilities to identify, assess, and mitigate cyber threats.
  • PCI Readiness and PCI 4.0: Preparing for and adapting to the latest standards in payment card industry security.
  • Data Protection: Implementing robust strategies to safeguard critical data from breaches and leaks.
  • Cloud Security Architecture: Designing and securing cloud environments to protect assets in a cloud-based infrastructure.

Embark on a journey to redefine your cybersecurity strategy, with workshops and recommendations that provide the knowledge and action plans to secure your digital future.

Get Access
Access IT Group
Offer
Details
Offer

10% Off CIS Pre-Hardened Virtual Machine Images for Windows, Mac, and Linux Operating Systems for improved Security Posture

Secure your cloud environment with CIS Hardened Images® for Windows, Mac, and Linux operating systems from the Center for Internet Security® (CIS®). These cost-effective virtual machine images provide you with a secure, on-demand, and scalable computing environment and can help you meet your industry compliance requirements. AccessIT has partnered with CIS to help RH-ISAC members improve their security posture with CIS Hardened images for AWS, Microsoft Azure, Google Cloud, and Oracle Cloud environments.

Details

CIS Hardened Images® are pre-hardened virtual machine (VM) images for Windows, Mac, and Linux operating systems (OSes). They offer built-in secure configuration and compliance according to the recommendations of the globally recognized CIS Benchmarks™, which are the only consensus-based, vendor-agnostic, best practice secure configuration guides both developed and accepted by government, business, industry, and academia. CIS Hardened images are available for over 50 OS versions on major cloud service platforms like AWS, Microsoft Azure, Google Cloud, and Oracle Cloud.

These cost-effective VM images provide you with a secure, on-demand, and scalable computing environment pre-configured to the security guidance of the CIS Benchmarks and that complements your existing cybersecurity infrastructure. They can help you save time and effort on avoiding misconfigurations and staying secure against malware, denial of service, and other cyber threats. CIS Hardened Images can also help you meet your compliance requirements to industry frameworks, including PCI DSS, NIST CSF, and FFIEC. Each CIS Hardened Image provides evidence of compliance and is regularly updated by the Center for Internet Security® (CIS®) to address emerging cyber threats.

Get Access
Armis
Offer
Details
Offer

10% Off the Armis Centrix Platform

As part of their commitment to the RH-ISAC community, Armis is offering an exclusive 10% off of the Armis Centrix Platform for members. Armis Centrix™ is the cyber exposure management platform that protects the entire attack surface and manages an organization’s cyber risk exposure in real time.

To redeem, email [email protected] with the subject line “10% Discount off the Armis Centrix Platform for RH-ISAC Members”

Details

A Comprehensive, Modular Approach

  • Armis Centrix™ for Asset Management and Security: Complete inventory of all asset types to see and secure your attack surface
  • Armis Centrix™ for OT/ IoT Security: See and secure OT networks and physical assets, ensure uptime, and build an effective and comprehensive security strategy
  • Armis Centrix™ for Vulnerability Prioritization and Remediation: See, consolidate, prioritize, and remediate all vulnerabilities
Flare logo
Offer
Details
Offer

Full Access for Two Weeks

Gain full access to Flare’s capabilities for two weeks, providing unparalleled visibility into your organization’s threat landscape. 

Features include:

  • 800 Identifiers: Gain visibility into up to 800 unique identifiers tied to your organization.
  • Global Search Bar: Instantly search across stealer logs, leaked credentials, dark web data, GitHub, and Telegram for risks.
  • Threat Flow: Timely, relevant, and trustworthy insights derived from dark web chatter, helping you scale threat research and reporting.

After two weeks, your trial will transition to monitoring 1 identifier (your main domain) for the remainder of the year. All other features will be removed.

Details

Flare is the leader in Threat Exposure Management, helping organizations of all sizes detect high-risk exposure found on the clear and dark web. Combining the industry’s best cybercrime database with an incredibly intuitive user experience, Flare enables customers to reclaim the information advantage and get ahead of threat actors.

Prevent Fraud and Account Takeovers

Account takeover (ATO) and fraud are escalating as cybercriminals exploit infostealer malware, stealer logs, and stolen session cookies to hijack accounts. Flare provides a world-class dataset of leaked credentials and active session cookies, accessible via API, enabling organizations to detect risky sessions, prevent fraud, and enhance security in real time.

Get Access
Flashpoint
Offer
Details
Offer

30-Day Trial + 15% Off Flashpoint Ignite

RH-ISAC members are eligible for a 15% discount with when they subscribe to Flashpoint’s Ignite platform, in addition to a 30-day free trial.

In the retail and hospitality sectors, generic feed overload often creates more noise than clarity. Flashpoint Ignite cuts through that clutter by delivering unrivaled primary-source data, AI-powered analysis, and expert human context, empowering your CTI analysts to detect emerging threats and accelerate investigations confidently.

Details

The Best Data for the Best Intelligence

  • Primary Source Collections: Access the most comprehensive and agile intelligence from open and hard-to-access sources.
  • Human + AI Analysis: Expert-vetted, AI-enhanced insights cut through the noise so you see only what matters.
  • Confident Action: Make high-stakes decisions with confidence, backed by primary-source data and trusted expertise.

Please contact [email protected] for any questions or concerns.

Get Access
GitGuardian
Offer
Details
Offer

Complimentary License

GitGuardian Enterprise License for RH-ISAC members:

  • Find secrets in your GitHub, GitLab, Bitbucket Data Center, and Azure repos
  • Scan new commits and pull requests in real-time
  • Shift left with pre-commit git hooks for early detection

The license includes our full suite of enterprise features and capabilities, and can support up to 100 developers. This offer retails at $30K per year

Details
Get Access
Imperva
Offer
Details
Offer

Complimentary 30-minute 1:1 Bad Bot Assessment

Join bot experts from Imperva, a Thales company, for a 30-minute session to assess the impact of bot attacks on your revenue and reputation. Learn about solutions that provide retailers real-time visibility and control over automated threats in order to protect customers, data, and revenue.

Details

Imperva, a Thales company, pioneered the bot mitigation category and continues to set the standard for advanced, AI-driven protection. Their solutions are recognized by Gartner, CRN, and SC Magazine, and trusted by global eCommerce and retail brands to stop evolving automated threats.

Get Access
Kasada
Offer
Details
Offer

Free 30-day Trial to Monitor and Assess Bot Traffic

Kasada offers a free instant Bot Threat Report for the site of your choosing. Additionally, for qualified RH-ISAC members, Kasada offers an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic. 

Details

The Bot Threat Report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.

Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.

Get Access
Contact
  • 8300 Boone Blvd.
    Suite 500
    Vienna, VA 22182
  • Staverenstraat 15
    7418 CJ Deventer
    Netherlands

  • (703) 848-9294
  • [email protected]
Who we are
  • About RH-ISAC
  • Core Members
  • Associate Members
  • Partners
  • Leadership & Staff
  • Careers
What We Do
  • Member Benefits
  • Sharing & Collaboration
  • Threat Intelligence
  • Working Groups
  • Career Growth
  • Benchmarking
  • Discounts
Join RH-ISAC
  • Core Membership
  • Associate Membership
  • LinkSECURE
  • Join RH-ISAC
Resources
  • Events
  • Blog
  • Reports & Documents
  • Press
  • Media Contact
  • Newsletter

© 2026 RH-ISAC. All rights reserved.

  • Contact Us
  • Privacy
  • Cookie Policy
  • Terms and Conditions
  • Member Login
  • LinkedIn: @Retail Hospitality ISACLinkedIn: @Retail Hospitality ISAC
  • X: @Retail Hospitality ISACX: @Retail Hospitality ISAC
  • Bluesky: @Retail Hospitality ISACBluesky: @Retail Hospitality ISAC
  • Github: @Retail Hospitality ISACGithub: @Retail Hospitality ISAC
  • Home
  • Who We Are
    • About RH-ISAC
    • Core Members
    • Associate Members
    • Leadership & Staff
    • Partners
    • Careers
  • What We Do
    • Sharing & Collaboration
    • Threat Intelligence
    • Working Groups
    • Career Growth
    • Benchmarking
    • Discounts & Special Offers
  • Join
    • Core Membership
    • Associate Membership
    • LinkSECURE
    • Join RH-ISAC
  • Events
    • Calendar
    • RSA Conference
    • Summit
    • Regional Workshops
    • CISO Events
    • Call for Presentations
    • Sponsor an Event
  • Resources
    • Blog
    • Reports
    • CISO Benchmark
  • Newsroom
    • Press Releases
    • Newsletter
    • Media Contact
  • Member Portal
  • Become a Member