Whistic vs UpGuard Comparison

Last updated by Abi Tyas Tunggal on May 7, 2020

scroll down

Outsourcing, digitization, and globalization have created new products and services, increased specialization, lowered costs, and improved access for customers and organizations alike. 

The downside is they've introduced cyber risk. Particularly the risk of data breaches and data leaks. In fact, a recent study by the Ponemon Institute and IBM put the average cost of a data breach at $3.92 million.

Today, cybersecurity and vendor risk management are a top priority not only for CISOs but senior management as a whole including Board members. 

The connected global economy has introduced new, sophisticated cyber threats and resiliency risks that many organizations are only now beginning to address. 

These trends have forced governments to enact laws and regulations that require the establishment of third-party cyber risk management programs designed to better identify, assess, mitigate, and oversee risks created by third-party vendors, fourth-parties, and even customers.

This is business as usual for financial services, healthcare, energy, military, and government organizations. However, these are no longer the only industries impacted. 

The introduction of general data protection laws with extraterritorial application has meant that even loosely regulated entities are now looking to improve their nascent vendor risk management processes.

In addition, the introduction of mandatory data breach notification requirements means the reputational impact of inadequate vendor and cybersecurity risk management practices are felt far more.

The best security teams we know of have developed the expertise required to translate technical details like security postures, cybersecurity risk assessments, vendor questionnaires, and information security policies into terms their most important non-technical stakeholders can understand, e.g. Board members and regulators.

Overall these trends have led third-party risk management and security teams to invest in third-party risk management tools. The problem is it's hard to decide on which ones to assess, let alone what criteria to assess them against. 

That's why we wrote this post to provide you with a clear comparison between Whistic and UpGuard, so you can make an informed decision and choose the tool that is right for you.  

Table of contents

Whistic overview

Whistic is based in Salt Lake City, Utah and aims to help companies hold each other accountable for protecting their shared data. 

Customers can use Whistic's workflows to conduct security reviews and respond to security reviews in one platform. 

Their platform has tools to help you onboard, assess, and track vendors, by allowing you to compare third-parties against a set of predefined criteria based on vendor questionnaires, documentation, and metadata.

Vendors can assess themselves against one of the top vendor questionnaires and publish it to their profile, along with supporting documentation including audits and certifications.  

Whistic UI

Whistic UI. Source: whistic.com

UpGuard overview

UpGuard was founded in 2012 in Sydney, Australia by technologists from Australia's largest banks. Today UpGuard has offices all over the world including the United States, Australia, Mexico, and Spain.

They used their first-hand experience to build a platform for the nascent DevOps market, designed to reduce the risk of security incidents through proactive documentation and configuration management

With proprietary, patented data visualization and risk analysis algorithms, UpGuard gave Operations and Security teams the ability to understand their risk exposure within the data center and cloud.

We then took this expertise and applied it to external security performance assessment. UpGuard Vendor Risk allows you to instantly assess the external security performance of any organization and produce a security rating from 0 to 950. 

Additionally, UpGuard BreachSight allows you to instantly assess your own organization's external security posture while continuously monitoring for data leaks and exposed credentials. 

Our data breach and security research has been featured in the New York Times, Bloomberg, Washington Post, Forbes, and TechCrunch.

UpGuard UI

Whistic vs. UpGuard in-depth comparison

Learn about how Whistic and UpGuard compare across ten categories including capabilities, usability, community support, release rate, API and extensibility, third-party integrations, customers, predictive capabilities, and security ratings. 

1. Capabilities

Whistic relies on point-in-time risk assessment to determine enterprise risk and primarily focuses on the results of standardized questionnaires.

In contrast, UpGuard augments standardized security questionnaires with data-driven, instantaneous security ratings. Not only are questionnaires resource-intensive, but they are also subjective and often times rendered inaccurate as new security issues emerge. 

According to Gartner, cybersecurity ratings will become as important as credit ratings when assessing the risk of existing and new business relationships…these services will become a precondition for business relationships and part of the standard of due care for providers and procurers of services. Additionally, the services will have expanded their scope to assess other areas, such as cyber insurance, due diligence for M&A and even as a raw metric for internal security programs.

Read our full guide on security ratings to understand all their use cases

Additionally, both platforms offer the ability to create a security profile to publish completed security questionnaires.

  • Whistic: Relies on standardized security questionnaires.
  • UpGuard: Uses standardized security questionnaires along with an always up-to-date score between 0 and 950 along with the following letter grades, A: 801-950, B: 601-800, C: 401-600, D: 201-400, F: 0-200. You can request your free security rating by clicking here.

Risk assessment methodology

Whistic is focused on conducting and responding to security reviews. This is designed to remove inefficiencies in third-party risk management programs for organizations and their vendors alike, rather than completing the same questionnaire over and over, they can choose to publish it to their security profile. 

The standardization of security assessment practices against recognized security frameworks, and making attestations easily shareable helps all business save time, resources, and increases trust in the supply chain. 

That's why, like Whistic, UpGuard has introduced security profiles to help our customers save time and money by publishing completed security questionnaires and supporting documentation to their secure, UpGuard security profile. 

In addition, UpGuard adds critical risk monitoring capabilities, integrated vendor processes, and accessibility to provide businesses with a complete solution for risk and compliance needs. 

  • Whistic: Relies on point-in-time risk assessments that can become outdated until the next assessment process.
  • UpGuardAugments point-in-time risk assessments with security ratings to ensure information is always up-to-date. Our security ratings algorithm runs hundreds of individual checks including email security and email spoofing risks (SPF, DKIM, and DMARC), website security (SSL, HSTS, header exposure), phishing and malware risk, explicit checks for 200 services across thousands of ports (mail, app, user auth, file sharing, voice, administration, database, unidentified, and open ports), domain hijacking risk (DNSSEC and domain registry issues), reputational risks (CEO rating and employee rating), credential management (exposure to known data breaches and data leaks detected by our data leak detection engine). Each identified issue is given a risk prioritization category so you know what represents the highest risk. 

Scope

As you know, even small vendors can lead to large data breaches, e.g. the HVAC vendor that eventually led to Target's exposure of credit card and personal data on more than 110 million consumers.

As Whistic relies on manual point-in-time risk assessment, it may not cover small or specialist service providers.

  • Whistic: Unknown
  • UpGuard: 2,000,000 organizations scanned daily and new vendors can be automatically added by customers. 
  Whistic UpGuard
Capabilities 2/5 5/5

 

2. Usability and learning curve

The usability and design of a product play a large part in how quickly you can get up to speed and start getting your money's worth. 

Whistic and UpGuard offer their services via SaaS and are accessible from web-based platforms that can help you find, assess, and monitor vendors.   

  • Whistic: Risks detailed on each point-in-time vendor assessment, which means new risks are only detected during the next assessment process. Remediation requests are not available. Their risk assessments are aligned to the VSA questionnaire, CAIQ, SIG, NIST Cybersecurity Framework, CIS Security Controls, and Privacy Shield Framework.
  • UpGuard: High-level summation of risk with the ability to drill down into precise technical details. Each risk is prioritized based on extensive research conducted by our in-house security team, and where possible remediation and protection suggestions are provided. Additionally, we have a library of pre-built questionnaires that can be sent and managed with the UpGuard platform including a pandemic (e.g. coronavirus), ISO 27001, PCI DSS, NIST Cybersecurity Framework, CCPA, and Modern Slavery questionnaires. Read our full guide on the top security questionnaires here.
  Whistic UpGuard
Usability and learning curve 4/5 5/5

3. Community support

Whistic and UpGuard both invest in their community and try to make it as easy as possible for customers and prospects to get up to speed, reduce operational overhead, and decide on the right product for them. 

Each company has its own blog that is a useful source of information for cybersecurity awareness training, as well as vendor risk management best practices.

  Whistic UpGuard
Community support 3/5 5/5

4. Release rate

Information security needs to constantly adapt and change to keep up with changes with the information and technology it is designed to protect. This means vendor risk management best practices are constantly changing too.

New vulnerabilities are added to CVE on a daily basis, attackers find new ways to exploit programming errors, and security controls become invalid constantly. 

You need to be able to rely on your security tooling, and that means they need to be able to incorporate changes quickly. 

UpGuard has adopted DevOps principles internally to develop, test, and release software on a continuous basis, ensuring fast, consistent, and safe releases that are thoroughly tested.

  Whistic UpGuard
Release rate 3/5 4/5

 

5. Pricing and support

Software can be expensive, especially third-party risk management software. The industry often uses opaque pricing policies designed to take power away from the purchaser, and they are typically priced on a per vendor, per year basis except in some cases where reports can be generated for a fixed price. 

Whistic is more expensive than UpGuard which can price out small to medium-size businesses and relegate even large organizations to managing only their most at-risk vendors.

Both products offer professional services to help you determine your needs and can create custom questionnaires. 

  • Whistic: Reported to start at $25,000 and is based on the number of vendors managed in the platform or the number of security questionnaires to which you're responding.
  • UpGuardUpGuard has a transparent pricing model for UpGuard Vendor Risk and UpGuard BreachSight, which you can view here. Vendor Risk pricing starts at $179 for a one-time report on a vendor or $29 per month per vendor billed annually. UpGuard BreachSight pricing starts at $299 per month billed annually. If you have any questions, please let us know via sales@upguard.com and we will follow-up.
  Whistic UpGuard
Pricing and support 1/5 5/5

6. API and extensibility

While both services have their own platforms, customers may want to access the resources on a different platform or consolidate reporting into a centralized dashboard. 

The good news is both services offer standard APIs to pull data. 

  Whistic UpGuard
API and extensibility 4/5 4/5

7. Third-party integrations

APIs are useful for technical staff, but not all vendor risk management teams have access to developers. This is why standard third-party integrations are an important part of decision-making.  

  • Whistic: Integrates with RiskRecon, Active Directory, Okta, and onelogin.
  • UpGuardIntegrates with GRC platforms, ticketing systems like ServiceNow, and more.
  Whistic UpGuard
Third-party integrations 4/5 4/5

8. Customers

The best proof comes from each solution's customers. Whistic and UpGuard both have impressive customer lists, none more distinguished than the other. 

Here's what a few UpGuard customers had to say about their experience. You can read more on Gartner reviews.

  • "UpGuard has given us a view of our vendor security posture. The ability to launch a questionnaire or ask for a plan of remediation for items that show as vulnerable is also a great added value and a time saver. UpGuard is also very customer focused. They respond quickly to issues and to questions and welcome any input that could improve the product. Overall it is one of the best value add tools we have."
  • "The simplicity of the product is fantastic. My team and I were able to be up and running in minutes. We monitor risks on over 25 vendors in near real-time and use these statistics to report to the C suite and Board of Directors. Upguard has become part of the critical cybersecurity metrics that we monitor and report upon."
  • "The ease of use and simplicity of the product is excellent. We were able to be up and running with 50 vendors within minutes not hours. The reporting is used for monthly statistics and is reported to our Senior Management. Upguard has become an integral part of our critical cybersecurity metrics that we monitor and report upon."
  Whistic UpGuard
Customers 5/5 5/5

9. Predictive capabilities

The main reason we all invest in security tools is to prevent incidents from happening in the first place. 

This makes a solution's ability to prevent data breaches and other cyber attacks the most important thing. 

This is where Whistic and UpGuard truly differ. 

  • Whistic: Relies on risk assessments which can quickly become out of date as new zero-day exploits are discovered and new IT infrastructure is used. The truth is that questionnaires, much like penetration testing, can be subjective and become inaccurate over time as new security issues emerge. Additionally, Whistic provides no controls for capturing data loss incidents. 
  • UpGuard: As UpGuard checks for misconfigurations across your Internet footprint, many important breach vectors are covered, including phishing, ransomware susceptibility (like WannaCry), man-in-the-middle attacks, DNSSEC, vulnerabilities, email spoofing, domain hijacking, and DNS issues. For example, we were able to detect data exposed in a GitHub repository by an AWS engineer in 30 minutes. We reported it to AWS and the repo was secured the same day. This repo contained personal identity documents and system credentials including passwords, AWS key pairs, and private keys. We're able to do this because we actively discover exposed datasets on the open and deep web, scouring open S3 buckets, public Github repos, and unsecured RSync and FTP servers. Our data leak discovery engine continuously searches for keyword lists provided by our customers and is continually refined by our team of analysts, using the expertise and techniques gleaned from years of breach research. The UpGuard methodology is continuously refined based on the actual data breaches we have discovered and reported to the world in the New York Times, Bloomberg, Washington Post, Forbes, and TechCrunch.
  Whistic UpGuard
Predictive capabilities 2/5 5/5

10. Security rating

Finally, let's take a look at how Whistic and UpGuard compare when assessed by UpGuard's platform on April 2, 2020. It's important to note that UpGuard adheres to the Principles of Fair and Accurate Security Ratings:

  • Transparency: UpGuard believes in providing full and timely transparency not only to our customers but to any organization that wants to understand their security posture, which is why you can request your free security rating here and you can book a free trial of our platform here.
  • Dispute, Correction, and Appeal: UpGuard is committed to working with customers, vendors and any organization that believes their score is not accurate or outdated.
  • Accuracy and Validation: UpGuard's security ratings are empirical, data-driven and based on independently verifiable and accessible information.
  • Model Governance: While the datasets and methodologies used to calculate our security ratings can change from time to time to better reflect our understanding of how to mitigate cybersecurity risk, we provide reasonable notice and explanation to our customers about how their security rating may be impacted.
  • Independence: No commercial agreement or lack thereof, gives an organization the ability to improve its security rating without improving their security posture.
  • Confidentiality: Any information disclosed to UpGuard during the course of a challenged rating or dispute is appropriately protected. Nor do we provide third-parties with sensitive or confidential information on rated organizations that could lead to system compromise.

Although all platforms have a good security rating, UpGuard leads the pack by 80 points.

  • Whistic839/950 or A letter grade
  • UpGuard: 919/950 or A letter grade
  Whistic UpGuard
Security rating Whistic Security Rating 839/950 UpGuard Security Rating 919/950
  4/5 5/5

Scoreboard and summary

  Whistic UpGuard
Capabilities 2/5 5/5
Usability and learning curve 4/5 5/5
Community support 3/5 5/5
Release rate 3/5 4/5
Pricing and support 1/5 5/5
API and extensibility 4/5 4/5
Third-party integrations 4/5 4/5
Customers 5/5 5/5
Predictive capabilities 2/5 5/5
Security rating 4/5 5/5
Total 3.2 4.7

Conclusion

At the end of the day, the easiest way to decide between Whistic and UpGuard is to use each before deciding. That's why you can book a free tailored 7-day trial on UpGuard's platform here. You'll get access to UpGuard Vendor Risk and UpGuard BreachSight for those seven days.

At UpGuard, we believe security ratings are important, as are point-in-time assessments but neither of them is a complete solution when used by themselves. That's why UpGuard uses both, examining an organization's Internet footprint across all vectors by which data exposure and service outage can occur, and sending security questionnaires. 

Our vendor questionnaire library can help you go beyond security ratings and to the assessment of internal security controls that aren't as easily determined. UpGuard is also the only company to offer a complete 360-degree view of third-party cyber risk exposure and an internal cyber risk management solution, Core, allowing organizations to completely manage primary risk as well.

UpGuard's easy to use platform is a complete security platform that gives you great insight into your security posture and your vendors', as well as how your organization's security posture is perceived from the outside. Giving you and your business partners a clear understanding of how and where to improve your cybersecurity and information security to prevent cyber attacks and reduce cybersecurity threats.

Try UpGuard for free for 7 days by clicking here. Before your 7-day trial begins, we'll provide you and your team with a free, personalized 45-minute onboarding call with one of our cybersecurity experts. They’ll help you get the most out of the UpGuard platform by showing you how to:

  • Continuously monitor your 3rd party vendors
  • Detect and remediate any leaked credentials and data exposures
  • Instantly assess your external security posture

Other third-party risk management software comparisons

If you'd like to compare other third-party risk management software, see our other comparison posts:


Related posts

Learn more about the latest issues in cybersecurity