Tech Marketplace:
Discounts and Special Offers
Industry-leading service and product providers committed to the RH-ISAC community
Free 1-Year Subscription
RH-ISAC members get a complimentary 12-month membership for one executive for the 360 Privacy flagship 360 Enterprise tiered offering. This includes the removal of Personally Identifiable Information from 400+ public data broker websites, Monthly Deletion Reporting, and Optional Decoy data deployment.
To redeem, email [email protected] with the subject line “RH-ISAC Exclusive Offer: 360 Privacy”
360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes, and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.
10% Off Penetration Testing & Complimentary Strategic Workshop
Secure your systems and fortify your defenses with AccessIT Group‘s expert-led penetration tests, meticulously tailored to meet the unique needs of your industry. By partnering with AccessIT Group, you’ll gain invaluable insights into potential vulnerabilities and strengthen your security posture for the year ahead. Additionally, sign up for free strategic workshop, tailored to navigate the complexities of the modern information age.
Penetration Testing
Why Choose Us?
- Proven Expertise: With years of experience and a track record of success, we’re your trusted cybersecurity partner.
- Comprehensive Solutions: Our work ensures thorough testing across all critical areas of your infrastructure including but not limited to: External testing, Internal testing, Cloud testing, Application testing, phishing & more.
- Customer Satisfaction: Join countless satisfied clients who have enhanced their security with our services.
Don’t let cyberthreats compromise your operations. Take advantage of this special offer and invest in your organization’s security today.
**The 10% discount applies to the purchase order price of your latest penetration test, given that it’s dated within the last 24 months and does not already include the promotional rate. Offer valid for Retail & Hospitality ISAC members only.
Strategic Workshop
Transform your organization’s approach to cybersecurity with a free 2-3 hour session from our strategic workshop series, tailored to navigate the complexities of the modern information age. Our series is designed to equip your team with the insights and tools needed to fortify your cybersecurity posture in a rapidly evolving landscape. Each workshop is crafted to help your team address key areas of cybersecurity, ensuring your organization stays ahead of threats and compliant with industry standards.
As your strategic partner, we are committed to evolving with you, continuously updating our offerings to include the most relevant and impactful topics. Join us to proactively enhance your cybersecurity strategy and turn potential vulnerabilities into strengths.
Potential Workshop Topics:
- Technology Rationalization: Streamlining your cybersecurity tech stack for efficiency and effectiveness.
- Threat Detection & Response: Building and enhancing capabilities to identify, assess, and mitigate cyber threats.
- PCI Readiness and PCI 4.0: Preparing for and adapting to the latest standards in payment card industry security.
- Data Protection: Implementing robust strategies to safeguard critical data from breaches and leaks.
- Cloud Security Architecture: Designing and securing cloud environments to protect assets in a cloud-based infrastructure.
Embark on a journey to redefine your cybersecurity strategy, with workshops and recommendations that provide the knowledge and action plans to secure your digital future.
Free Online Brand Protection Monitoring
RH-ISAC members are eligible for free online brand protection monitoring from Allure Security to get alerted to websites impersonating your brand amongst more than 100 million sites examined daily.
- Get alerted to websites impersonating your brand amongst more than 100 million sites examined daily
- View potentially malicious URLs, domains, and indicators that match your brand
- Sample the value of Allure Security online brand protection with a free account
10% Off the Armis Centrix Platform
As part of their commitment to the RH-ISAC community, Armis are offering an exclusive 10% off of the Armis Centrix Platform for members. Armis Centrix™ is the cyber exposure management platform that protects the entire attack surface and manages an organization’s cyber risk exposure in real time.
To redeem, email [email protected] with the subject line “10% Discount off the Armis Centrix Platform for RH-ISAC Members”
A Comprehensive, Modular Approach
- Armis Centrix™ for Asset Management and Security: Complete inventory of all asset types to see and secure your attack surface
- Armis Centrix™ for OT/ IoT Security: See and secure OT networks and physical assets, ensure uptime, and build an effective and comprehensive security strategy
- Armis Centrix™ for Vulnerability Prioritization and Remediation: See, consolidate, prioritize, and remediate all vulnerabilities
Free Trial: One Platform to Secure All GenAI
Sign up for a free trial to experience how CalypsoAI platform maximizes your AI investments while ensuring security, compliance, and performance. This offer includes a guided walk-through with one of our security consultants and a complimentary security audit to identify potential vulnerabilities to emerging threats.
This RH-ISAC-exclusive offer starts with a tailored walk-through of the CalypsoAI platform and complimentary security audit to help you successfully test-drive our solution. This enhanced experience will get you the path to ensuring your AI security strategy is as advanced as the threats you face.
Free 30-day Trial to Monitor and Assess Bot Traffic
Kasada offers a free instant Bot Threat Report for the site of your choosing. Additionally, for qualified RH-ISAC members, Kasada offers an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic.
The Bot Threat Report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.
Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.
Free Security Posture Analysis & Proof-of-Concept Trial
RH-ISAC members can get a complimentary Security Posture Report from Red Sift that analyzes attack surface management, certificate monitoring, domain impersonation, and email security. After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions.
Red Sift Security Posture Report covers:
- Attack Surface Management – continuous and automatic identification of configuration issues, including deep configuration and prioritization data to speed remediation
- Certificate monitoring – including issuance and expiration, configuration information to identify current certificates and causes of invalidation. We also find and monitor 3rd party certificates.
- Domain impersonation – Insight into malicious activity for key domains, words, and logos.
- Email security – Understand your email domain security setup and any vulnerabilities to exact domain impersonation which is used in phishing attacks.
After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions. An active ISAC membership and commitment to a 45-minute meeting to review the report with the Red Sift team. A free POC requires the member’s involvement to build a requirements plan covering objectives, participants, and timelines before beginning the POC.
Free 30-day Trial for the RiskRecon Portal
Get free access to the RiskRecon portal and see the security ratings of up to 50 vendors of your choice. You’ll receive access security ratings for up to 50 vendors in your ecosystem, a RiskRecon report of your own organization, risk prioritized security findings via RiskRecon’s unique Risk Priority Matrix, and a quick start guide to assist with your on-boarding and full access to our expert Solutions Consulting team.
Red Sift Security Posture Report covers:
- Attack Surface Management – continuous and automatic identification of configuration issues, including deep configuration and prioritization data to speed remediation
- Certificate monitoring – including issuance and expiration, configuration information to identify current certificates and causes of invalidation. We also find and monitor 3rd party certificates.
- Domain impersonation – Insight into malicious activity for key domains, words, and logos.
- Email security – Understand your email domain security setup and any vulnerabilities to exact domain impersonation which is used in phishing attacks.
After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions. An active ISAC membership and commitment to a 45-minute meeting to review the report with the Red Sift team. A free POC requires the member’s involvement to build a requirements plan covering objectives, participants, and timelines before beginning the POC.
Free 60-Day Enterprise License
Get a complimentary SecurityScorecard Enterprise License that enables you to monitor your own organization as well as up to 30 vendors, suppliers, or competitors (the choice is yours) for 60 days.
SecurityScorecard scores and monitors over 12 million companies using an A to F grade scale that correlates with breach risk (F Companies are 7.7X more likely to be breached than A Companies). The platform can score and monitor the external cybersecurity posture of any organization using non-intrusive methods and show it how to improve via actionable detail.
You and your team can leverage SecurityScorecard for a variety of use-cases that include, vendor risk management, enterprise monitoring, board reporting, M&A and regulatory compliance.
Free Access to the Stairwell Platform
Safely share and analyze malware samples across the RH-ISAC community with the Stairwell platform.
Upload your malware samples to the Stairwell platform, analyze them at the binary level, find potential variants within our global dataset, and share your findings and files across the RH-ISAC membership to create a safer, more informed community. This offer is only available to current RH-ISAC members.
Free 2-Year Look Back Analysis to Identify Past Fraud and Human Errors
TrustMi‘s core AI engine will build a strong baseline based on the information about your vendors and payments from the last 2 years. During the baseline process, an analysis will be performed to detect fraud and abnormal activities without disrupting your business workflow and with minimal to no involvement from your organization.
Global visibility
- Across-the-board payment-related monitored mailboxes
- Transactions value
- Global list of suppliers
- Global view of transaction approval status
Trust
- Transactions validity verdict
- Vendor validity verdict
- Financial process validation
Value
- Risky change of bank accounts
- Mitigation of past fraud attempts
- Double invoice payment
- Dollar amount saved in fraud
Complimentary Advanced Continual Threat Hunt
Trustwave is a cyber-only focused company that hunts threats and stops threats all day every day. Trustwave can detect what others can’t enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. RH-ISAC members can register for one complimentary Advanced Continual Threat Hunt.
Number of hunts are limited and available on a first come, first served basis. Only one hunt per customer request. Customer must have an EDR supported by Trustwave.
Free 30-Day Trial
As part of our commitment to the RH-ISAC community, Xeol are offering a 30-day trial. Sign up with your corporate email, and the company will grant you access to Xeol. See your full EOL posture in 5 minutes.
Xeol closes the end-of-life gap in your vulnerability management program:
- Continuously monitor for EOL from commercial software to open source projects.
- Proactively manage the riskiest EOL issues because their vulnerabilities cannot be patched.
- Protect your PCI environments with security policies that gate risky EOL dependencies.
A trusted partner to strengthen your authentication security & strategy
Yubico provides retail and hospitality organizations peace of mind to protect against modern phishing attacks and account takeovers with the YubiKey—a security key that is the gold standard in phishing-resistant multi-factor authentication (MFA) and passwordless logins. As an RH-ISAC core member, you receive exclusive access to an infographic and white paper that showcase how the YubiKey can help you secure your organization without a rip or replace, and offer best-in-class customer experiences.
Meet with us to learn how you can get started with YubiKeys to strengthen your authentication posture, accelerate Zero Trust, and adopt modern passwordless authentication: yubi.co/contact
- Not all forms of MFA are created equal in terms of usability and security, but the YubiKey balances both, delivering highest-assurance security with the best user experience.
- With the YubiKey, you accelerate your Zero Trust strategy, ensuring that your critical and sensitive company and customer data always stays protected.
- YubiKeys are simple to integrate into existing environments with multi-protocol support for both legacy and modern infrastructures, helping you bridge to modern passwordless authentication.
Meet with us to learn how you can get started with YubiKeys to strengthen your authentication posture, accelerate Zero Trust, and adopt modern passwordless authentication: yubi.co/contact